SSCMS v7.4.0 SQL Injection Vulnerability in stl:sqlContent Tag
SSCMS v7.4.0 is vulnerable to SQL injection via the stl:sqlContent tag's queryString attribute, allowing attackers to execute arbitrary SQL statements through crafted payloads submitted to the /api/stl/actions/dynamic endpoint.
SSCMS v7.4.0 is susceptible to a SQL injection vulnerability (CVE-2026-7435) within the stl:sqlContent tag. The vulnerability arises because the queryString attribute is passed directly to database execution without adequate sanitization or parameterization. This flaw enables attackers to inject malicious SQL code by crafting encrypted payloads and submitting them to the /api/stl/actions/dynamic endpoint. Successful exploitation can lead to unauthorized access to the database, disclosure of sensitive information, authentication bypass, modification of data, or even complete compromise of the database. This vulnerability poses a significant risk to organizations using the affected SSCMS version, potentially leading to severe data breaches and system disruption.
Attack Chain
- The attacker identifies an SSCMS v7.4.0 instance.
- The attacker crafts a malicious SQL injection payload, specifically targeting the
queryStringattribute within thestl:sqlContenttag. - The attacker encrypts the crafted SQL injection payload.
- The attacker sends the encrypted payload to the
/api/stl/actions/dynamicendpoint using an HTTP POST request. - The SSCMS application receives the request and processes the
stl:sqlContenttag without proper sanitization. - The application executes the attacker-controlled SQL query against the database.
- The attacker gains unauthorized access to the database, potentially extracting sensitive data or modifying existing records.
- The attacker may escalate privileges or move laterally within the compromised system, depending on the level of access gained.
Impact
Successful exploitation of this SQL injection vulnerability could lead to severe consequences. An attacker could gain complete control over the SSCMS database, potentially exposing sensitive user data, confidential business information, or proprietary intellectual property. Data breaches resulting from this vulnerability could lead to significant financial losses, reputational damage, and legal liabilities. The lack of specifics about victim count or sectors targeted makes quantification difficult, but the potential impact is high for any organization using the affected software.
Recommendation
- Apply any available patches or updates for SSCMS v7.4.0 to address the SQL injection vulnerability described in CVE-2026-7435.
- Implement input validation and sanitization measures to prevent SQL injection attacks, specifically focusing on the
queryStringattribute of thestl:sqlContenttag. - Deploy the Sigma rule
Detect Suspicious SSCMS stl:sqlContent Requeststo identify potential exploitation attempts targeting the/api/stl/actions/dynamicendpoint.
Detection coverage 2
Detect Suspicious SSCMS stl:sqlContent Requests
highDetects suspicious HTTP requests to the SSCMS /api/stl/actions/dynamic endpoint potentially exploiting the SQL injection vulnerability.
Detect SSCMS stl:sqlContent with UNION SELECT
criticalDetects potential SQL injection attempts using UNION SELECT in SSCMS stl:sqlContent requests.
Detection queries are kept inside the platform. Get full rules →