NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Prior to version 2.1.4, NamelessMC is vulnerable to SQL injection by providing an unexpected square bracket GET parameter syntax. Square bracket GET parameter syntax refers to the structure `?param[0]=a¶m[1]=b¶m[2]=c` utilized by PHP, which is parsed by PHP as `$_GET['param']` being of type array. This issue has been patched in version 2.1.4.
Metrics
Affected Vendors & Products
References
History
Fri, 18 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 18 Apr 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Prior to version 2.1.4, NamelessMC is vulnerable to SQL injection by providing an unexpected square bracket GET parameter syntax. Square bracket GET parameter syntax refers to the structure `?param[0]=a¶m[1]=b¶m[2]=c` utilized by PHP, which is parsed by PHP as `$_GET['param']` being of type array. This issue has been patched in version 2.1.4. | |
Title | NamelessMC Vulnerable to SQL Injections in /user/messaging and /panel/users/reports Pages | |
Weaknesses | CWE-89 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-18T16:24:24.300Z
Reserved: 2025-04-06T19:46:02.463Z
Link: CVE-2025-32389

Updated: 2025-04-18T16:15:16.987Z

Status : Received
Published: 2025-04-18T16:15:23.033
Modified: 2025-04-18T16:15:23.033
Link: CVE-2025-32389

No data.