CVE-2025-40639
High
|8.7No Exploit
Plain English Summary
AI-powered analysis for quick understanding
An attacker can manipulate the 'promo_send' parameter in Eventobot's discount calculation feature to access, modify, or delete data in the database. This vulnerability can be exploited if the attacker can send requests to the affected PHP script, potentially leading to serious data breaches or loss.
Technical Description
A SQL injection vulnerability has been found in Eventobot. This vulnerability allows an attacker to retrieve, create, update and delete databases through the 'promo_send' parameter in the '/assets/php/calculate_discount.php'.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$4,579($1K-$5K)
Vendor Response
Grade APatched in 1 day
Quick Information
Published
Mar 9, 2026
30 days ago
Last Modified
Mar 10, 2026
28 days ago
Vendor
sbitsoft
Product
eventobot