<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>EyouCMS (&lt;= 1.7.9) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/eyoucms--1.7.9/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 16:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/eyoucms--1.7.9/feed.xml" rel="self" type="application/rss+xml"/><item><title>EyouCMS SQL Injection Vulnerability (CVE-2026-7389)</title><link>https://feed.craftedsignal.io/briefs/2026-04-eyoucms-sql-injection/</link><pubDate>Wed, 29 Apr 2026 16:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-eyoucms-sql-injection/</guid><description>A remote SQL injection vulnerability (CVE-2026-7389) exists in EyouCMS versions up to 1.7.9 due to improper handling of the 'sort_asc' argument in the GetSortData function, potentially allowing attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>A security vulnerability, CVE-2026-7389, has been identified in EyouCMS, specifically affecting versions up to 1.7.9. This vulnerability stems from insufficient sanitization of user-supplied input passed to the <code>sort_asc</code> argument of the <code>GetSortData</code> function located in the <code>application/common.php</code> file. An unauthenticated, remote attacker can exploit this vulnerability to inject malicious SQL queries into the application. Publicly available exploits increase the risk of widespread exploitation. The project maintainers were notified but have not yet addressed the issue, making timely detection and mitigation critical for defenders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an EyouCMS instance running a vulnerable version (&lt;= 1.7.9).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>GetSortData</code> function within <code>application/common.php</code>.</li>
<li>The crafted request includes a manipulated <code>sort_asc</code> argument containing a SQL injection payload.</li>
<li>The application processes the request without proper sanitization of the <code>sort_asc</code> parameter.</li>
<li>The unsanitized input is incorporated into a SQL query executed by the application.</li>
<li>The injected SQL code modifies the query logic, allowing the attacker to potentially bypass authentication.</li>
<li>The attacker can read sensitive data from the database, such as user credentials or configuration information.</li>
<li>The attacker may escalate privileges or gain complete control of the database server, leading to data exfiltration or service disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7389) could allow an attacker to read, modify, or delete sensitive data stored in the EyouCMS database. This could include user credentials, financial information, or other confidential data. Since an exploit is publicly available, organizations using vulnerable versions of EyouCMS are at increased risk of compromise, potentially leading to data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect EyouCMS SQL Injection via sort_asc Parameter</code> to identify exploitation attempts in web server logs.</li>
<li>Inspect web server logs for suspicious requests targeting <code>application/common.php</code> with unusual parameters in the <code>sort_asc</code> argument based on the Sigma rule.</li>
<li>Apply input validation and sanitization to the <code>sort_asc</code> parameter in the <code>GetSortData</code> function to prevent SQL injection.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7389</category><category>web-application</category></item></channel></rss>