CVE-2025-6095

HIGH

Jasmin Ransomware 1.0.1 - SQL Injection

Title source: llm
STIX 2.1

Description

A vulnerability, which was classified as critical, was found in codesiddhant Jasmin Ransomware 1.0.1. Affected is an unknown function of the file /checklogin.php. The manipulation of the argument username/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.312564
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.312564
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.588833
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.588834

Scores

CVSS v3 7.3
EPSS 0.4871
EPSS Percentile 97.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-74 CWE-89
Status published
Products (1)
codesiddhant/jasmin-ransomware 1.0.1
Published Jun 15, 2025
Tracked Since Feb 18, 2026