{"uuid": "e3335158-b138-47df-8fd0-ae2c8c5e3e5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22371", "type": "seen", "source": "https://t.me/cvedetector/22863", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22371 - SicommNet BASEC SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-22371 \nPublished : April 14, 2025, 4:15 p.m. | 19\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SicommNet BASEC (SaaS Service) login page allows an unauthenticated remote attacker to Bypass Authentication and execute arbitrary SQL commands. This issue at least affects BASEC for the date of 14 Dec 2021 onwards. It is very likely that this vulnerability has been present in the solution before that.  \n  \nAs of the date of this CVE record, there has been no patch \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-14T18:51:19.000000Z"}