KLiK SocialMediaWebsite SQL Injection Vulnerability (CVE-2026-7002)
KLiK SocialMediaWebsite up to version 1.0.1 is vulnerable to SQL injection via manipulation of the c_id argument in the /includes/get_message_ajax.php file, specifically affecting the Private Message Handler component, which can be exploited remotely.
KLiK SocialMediaWebsite version 1.0.1 and earlier is susceptible to a SQL injection vulnerability (CVE-2026-7002) affecting the Private Message Handler component. This vulnerability resides within the /includes/get_message_ajax.php file, and is triggered by manipulating the c_id argument. The attack can be launched remotely without authentication, potentially allowing unauthorized access to sensitive data within the application’s database. Defenders should prioritize identifying and mitigating this vulnerability to prevent potential data breaches and unauthorized access to user information. The vulnerability was published on April 25, 2026.
Attack Chain
- An attacker identifies a KLiK SocialMediaWebsite instance running version 1.0.1 or earlier.
- The attacker crafts a malicious HTTP request targeting the
/includes/get_message_ajax.phpendpoint. - The attacker injects a SQL payload into the
c_idparameter of the HTTP request. - The web server processes the request and passes the malicious SQL query to the database.
- The database executes the injected SQL query without proper sanitization, leading to unintended data retrieval or modification.
- The attacker retrieves sensitive information from the database, such as user credentials or private messages.
- The attacker may use the stolen credentials to gain unauthorized access to user accounts.
Impact
Successful exploitation of this SQL injection vulnerability can lead to unauthorized access to sensitive data stored in the KLiK SocialMediaWebsite database. This could include user credentials, private messages, and other personal information. An attacker could potentially gain complete control over the application’s data, leading to data breaches, identity theft, and other malicious activities. Given the wide use of social media platforms, a successful attack could affect a large number of users.
Recommendation
- Apply any available patches or updates for KLiK SocialMediaWebsite to address CVE-2026-7002.
- Implement proper input validation and sanitization techniques to prevent SQL injection attacks.
- Deploy the Sigma rule to detect attempts to exploit this SQL injection vulnerability by monitoring web server logs for suspicious requests targeting
/includes/get_message_ajax.phpwith potentially malicious SQL payloads in thec_idparameter. - Monitor web server logs for HTTP requests to
/includes/get_message_ajax.phpcontaining SQL keywords (e.g.,SELECT,UNION,UPDATE,INSERT,DELETE) in thec_idparameter.
Detection coverage 2
Detect SQL Injection Attempt in KLiK SocialMediaWebsite
highDetects potential SQL injection attempts targeting the /includes/get_message_ajax.php endpoint in KLiK SocialMediaWebsite by looking for SQL keywords in the c_id parameter.
Detect SQL Injection Attempt in KLiK SocialMediaWebsite - Blind SQLi
mediumDetects potential blind SQL injection attempts targeting the /includes/get_message_ajax.php endpoint in KLiK SocialMediaWebsite by looking for time-based SQL keywords in the c_id parameter.
Detection queries are kept inside the platform. Get full rules →