Home

Description

ZenTao Biz < 6.5, ZenTao Max < 3.0, ZenTao Open Source Edition < 16.5, and ZenTao Open Source Edition < 16.5.beta1 contain an SQL injection vulnerability in the login functionality. The application does not properly validate the account parameter on /zentao/user-login.html before using it in a database query. A remote unauthenticated attacker can exploit this issue to execute crafted SQL expressions and retrieve sensitive information from the backend database, including user and application data. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-07 UTC.

PUBLISHED Reserved 2025-11-13 | Published 2025-11-13 | Updated 2025-11-16 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

Any version before 6.5
affected

Default status
unaffected

Any version before 3.0
affected

Default status
unaffected

Any version before 16.5
affected

Any version before 16.5.beta1
affected

Timeline

2022-06-14:CNVD-2022-42853 is publicly disclosed.

References

www.cnvd.org.cn/flaw/show/CNVD-2022-42853 government-resource vdb-entry

www.zentao.pm/...ntao-community-edition-release-65-1171.html patch

www.zentao.pm/...ntao-community-edition-release-30-1172.html patch

www.zentao.pm/...tao-community-edition-release-165-1170.html patch

www.zentao.pm/...ao-community-edition-release-1651-1143.html patch

www.vulncheck.com/...open-source-edition-sqli-via-user-login third-party-advisory

cve.org (CVE-2022-4984)

nvd.nist.gov (CVE-2022-4984)

Download JSON