NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Prior to version 2.1.4, NamelessMC is vulnerable to SQL injection by providing an unexpected square bracket GET parameter syntax. Square bracket GET parameter syntax refers to the structure `?param[0]=a¶m[1]=b¶m[2]=c` utilized by PHP, which is parsed by PHP as `$_GET['param']` being of type array. This issue has been patched in version 2.1.4.
Metrics
Affected Vendors & Products
References
History
Tue, 13 May 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Namelessmc
Namelessmc nameless |
|
CPEs | cpe:2.3:a:namelessmc:nameless:*:*:*:*:*:*:*:* | |
Vendors & Products |
Namelessmc
Namelessmc nameless |
|
Metrics |
cvssV3_1
|
Fri, 18 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 18 Apr 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Prior to version 2.1.4, NamelessMC is vulnerable to SQL injection by providing an unexpected square bracket GET parameter syntax. Square bracket GET parameter syntax refers to the structure `?param[0]=a¶m[1]=b¶m[2]=c` utilized by PHP, which is parsed by PHP as `$_GET['param']` being of type array. This issue has been patched in version 2.1.4. | |
Title | NamelessMC Vulnerable to SQL Injections in /user/messaging and /panel/users/reports Pages | |
Weaknesses | CWE-89 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-04-18T15:56:39.962Z
Updated: 2025-04-18T16:24:24.300Z
Reserved: 2025-04-06T19:46:02.463Z
Link: CVE-2025-32389

Updated: 2025-04-18T16:15:16.987Z

Status : Analyzed
Published: 2025-04-18T16:15:23.033
Modified: 2025-05-13T15:23:15.957
Link: CVE-2025-32389

No data.