We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability, which was classified as critical, was found in pmTicket Project-Management-Software up to 2ef379da2075f4761a2c9029cf91d073474e7486. This affects the function getUserLanguage of the file classes/class.database.php. The manipulation of the argument user_id leads to sql injection. It is possible to initiate the attack remotely. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
Es wurde eine kritische Schwachstelle in pmTicket Project-Management-Software bis 2ef379da2075f4761a2c9029cf91d073474e7486 gefunden. Hiervon betroffen ist die Funktion getUserLanguage der Datei classes/class.database.php. Durch die Manipulation des Arguments user_id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Dieses Produkt setzt Rolling Releases ein. Aus diesem Grund sind Details zu betroffenen oder zu aktualisierende Versionen nicht verfügbar.
2025-07-19: | Advisory disclosed |
2025-07-19: | VulDB entry created |
2025-07-19: | VulDB entry last update |
Allan Njuguna (VulDB User)
vuldb.com/?id.317001 (VDB-317001 | pmTicket Project-Management-Software class.database.php getUserLanguage sql injection)
vuldb.com/?ctiid.317001 (VDB-317001 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.614534 (Submit #614534 | pmTicket https://github.com/issue-tracking-system/Project-Management-Software 1 SQL Injection)
asciinema.org/a/3wu3WGpnrnMc2GDvSyLUqqHUF
Support options