{"id":"CVE-2025-4543","details":"A vulnerability, which was classified as critical, was found in LyLme Spage 2.1. This affects an unknown part of the file lylme_spage/blob/master/admin/ajax_link.php. The manipulation of the argument sort leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.","modified":"2026-03-20T04:21:20.608981Z","published":"2025-05-11T18:15:31.950Z","references":[{"type":"ADVISORY","url":"https://vuldb.com/?submit.567290"},{"type":"ADVISORY","url":"https://vuldb.com/?id.308289"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.308289"},{"type":"EVIDENCE","url":"https://github.com/yanbeiii/Proof-of-Concept/blob/main/lylme-sqli.md"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/lylme/lylme_spage","events":[{"introduced":"0"},{"last_affected":"ae11c514e0eb2a15fbcabcd13603fa9841c6f810"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.1.0"}]}}],"versions":["v0.2.0-beta","v0.2.1","v1.0","v1.0.1","v1.1.0","v1.1.0beta","v1.1.1","v1.1.2-beta","v1.1.3","v1.1.4","v1.1.5","v1.1.6","v1.2.0","v1.3.0","v1.5.0","v1.5.1","v1.6.0","v1.7.0","v1.8.0-bugfix","v1.8.5","v1.9.5","v2.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-4543.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"}]}