Home

Description

Log2Space Subscriber Management Software 1.1 is vulnerable to unauthenticated SQL injection via the `lead_id` parameter in the `/l2s/api/selfcareLeadHistory` endpoint. A remote attacker can exploit this by sending a specially crafted POST request, resulting in the execution of arbitrary SQL queries. The backend fails to sanitize the user input, allowing enumeration of database schemas, table names, and potentially leading to full database compromise.

PUBLISHED Reserved 2025-08-17 | Published 2025-10-21 | Updated 2025-10-21 | Assigner mitre

References

reference1.example.com/selfcare/login

github.com/apboss123/CVE-2025-56450/blob/main/README.md

cve.org (CVE-2025-56450)

nvd.nist.gov (CVE-2025-56450)

Download JSON