Cyber Posture

CVE-2023-27112

CriticalPublic PoC

Published: 21 January 2025

Published
21 January 2025
Modified
30 May 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

pearProjectApi v2.8.10 was discovered to contain a SQL injection vulnerability via the projectCode parameter at project.php.

Security Summary

CVE-2023-27112 is a SQL injection vulnerability (CWE-89) affecting pearProjectApi version 2.8.10. The issue resides in the projectCode parameter within the project.php endpoint, allowing malicious SQL queries to be injected and executed against the backend database. Published on 2025-01-21, it carries a CVSS v3.1 base score of 9.8, indicating critical severity due to its network accessibility and high impact potential.

The vulnerability can be exploited by unauthenticated remote attackers over the network with low complexity and no user interaction required (AV:N/AC:L/PR:N/UI:N/S:U). Successful exploitation grants high confidentiality, integrity, and availability impacts (C:H/I:H/A:H), enabling attackers to extract sensitive data, modify database contents, execute arbitrary SQL commands, or disrupt service availability.

Mitigation details are available in the GitHub issue at https://github.com/a54552239/pearProjectApi/issues/32, which documents the discovery and may include patch information or workarounds for affected deployments.

Details

CWE(s)
CWE-89

Affected Products

a54552239
pearprojectapi
2.8.10

References