Oinone Pamirs SQL Injection Vulnerability (CVE-2026-8734)
Oinone Pamirs up to version 7.2.0 is vulnerable to SQL injection in the RSQLToSQLNodeConnector.makeVariable function of the queryListByWrapper Interface, allowing remote attackers to execute arbitrary SQL commands.
Oinone Pamirs, up to version 7.2.0, is susceptible to SQL injection (CVE-2026-8734) within the RSQLToSQLNodeConnector.makeVariable function of the queryListByWrapper interface. This vulnerability enables a remote attacker to inject and execute arbitrary SQL commands by manipulating input to this function. The vulnerability has a CVSS v3.1 base score of 7.3, indicating a high severity. Public exploits targeting this flaw have been disclosed, increasing the risk of exploitation. The vendor was notified of the vulnerability but did not respond.
Attack Chain
- An attacker identifies an Oinone Pamirs instance running a version equal to or below 7.2.0 with the vulnerable
queryListByWrapperinterface exposed. - The attacker crafts a malicious HTTP request targeting the
queryListByWrapperinterface. - The request includes specially crafted input designed to inject SQL commands into the
RSQLToSQLNodeConnector.makeVariablefunction. - The application processes the malicious input without proper sanitization.
- The injected SQL commands are executed against the underlying database.
- The attacker gains unauthorized access to sensitive data stored in the database.
- The attacker may modify or delete data, potentially leading to data corruption or denial of service.
- The attacker could potentially use the database as a pivot point to compromise other systems on the network.
Impact
Successful exploitation of this SQL injection vulnerability (CVE-2026-8734) can lead to unauthorized access to sensitive information, data manipulation, and potential compromise of the underlying database server. Given the presence of publicly available exploits, organizations using vulnerable versions of Oinone Pamirs are at significant risk. The impact could range from data breaches and financial loss to reputational damage and disruption of services.
Recommendation
- Apply appropriate input validation and sanitization techniques to mitigate SQL injection vulnerabilities, referencing CWE-89.
- Deploy the Sigma rule
Detect CVE-2026-8734 Exploitation — SQL Injection in Oinone Pamirsto identify potential exploitation attempts. - Monitor web server logs for suspicious requests targeting the
queryListByWrapperinterface (logsource: webserver). - Review and restrict database access privileges to minimize the impact of potential SQL injection attacks.
Detection coverage 2
Detect CVE-2026-8734 Exploitation — SQL Injection in Oinone Pamirs
highDetects CVE-2026-8734 exploitation — suspicious HTTP requests containing SQL injection attempts targeting the queryListByWrapper interface.
Detect Potential SQL Injection via Suspicious Characters
mediumDetects potential SQL injection attempts through the presence of special characters and keywords commonly used in SQL injection payloads.
Detection queries are available on the platform. Get full rules →