CVE-2018-25208 PUBLISHED

qdPM 9.1 SQL Injection via filter_by Parameters

Assigner: VulnCheck
Reserved: 26.03.2026 Published: 26.03.2026 Updated: 26.03.2026

qdPM 9.1 contains an SQL injection vulnerability that allows unauthenticated attackers to extract database information by injecting SQL code through filter_by parameters. Attackers can submit malicious POST requests to the timeReport endpoint with crafted filter_by[CommentCreatedFrom] and filter_by[CommentCreatedTo] parameters to execute arbitrary SQL queries and retrieve sensitive data.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.8

Product Status

Vendor Qdpm
Product qdPM
Versions
  • Version 9.1 is affected

Credits

  • Özkan Mustafa Akkuş (AkkuS) finder

References

Problem Types

  • Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE