<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Fuel CMS 1.4.13 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/fuel-cms-1.4.13/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:23:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/fuel-cms-1.4.13/feed.xml" rel="self" type="application/rss+xml"/><item><title>Fuel CMS 1.4.13 Blind SQL Injection Vulnerability (CVE-2021-47980)</title><link>https://feed.craftedsignal.io/briefs/2026-05-fuelcms-sqli/</link><pubDate>Sat, 16 May 2026 16:23:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-fuelcms-sqli/</guid><description>Fuel CMS 1.4.13 is vulnerable to blind SQL injection via the 'col' parameter in the Activity Log interface, allowing authenticated attackers to manipulate database queries and extract information through time-based delays (CVE-2021-47980).</description><content:encoded><![CDATA[<p>Fuel CMS 1.4.13 is susceptible to a blind SQL injection vulnerability (CVE-2021-47980) within the Activity Log interface. This flaw allows authenticated attackers to inject arbitrary SQL code into the &lsquo;col&rsquo; parameter of requests to the logs endpoint. Successful exploitation enables attackers to manipulate database queries and potentially extract sensitive information from the database by observing response time delays. The vulnerability exists due to insufficient input sanitization of the &lsquo;col&rsquo; parameter when constructing SQL queries. Defenders should implement detection and prevention measures to mitigate the risk of unauthorized data access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker logs into the Fuel CMS application.</li>
<li>The attacker navigates to the Activity Log interface.</li>
<li>The attacker crafts a malicious HTTP request targeting the logs endpoint, injecting SQL code into the &lsquo;col&rsquo; parameter. The attacker crafts SQL injection payloads designed to cause time delays based on conditional logic.</li>
<li>The attacker sends the crafted HTTP request to the server.</li>
<li>The Fuel CMS application processes the request without proper sanitization of the &lsquo;col&rsquo; parameter, incorporating the malicious SQL code into a database query.</li>
<li>The database executes the injected SQL code.</li>
<li>The attacker monitors the response time from the server. By analyzing the timing, the attacker infers the results of the injected SQL queries, effectively extracting data bit by bit.</li>
<li>The attacker repeats this process, refining the SQL injection payloads to extract additional database information such as usernames, passwords, or other sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this blind SQL injection vulnerability (CVE-2021-47980) could allow an attacker to extract sensitive information from the Fuel CMS database. This information could include user credentials, configuration details, and other confidential data. The impact includes potential data breaches, unauthorized access to the system, and further compromise of the application and its underlying infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule designed to detect SQL injection attempts in HTTP requests targeting the logs endpoint in Fuel CMS to identify exploitation attempts (see rule below).</li>
<li>Apply input validation and sanitization to the &lsquo;col&rsquo; parameter in the Activity Log interface to prevent SQL injection, according to secure coding practices.</li>
<li>Monitor web server logs for suspicious activity, such as unusual requests to the logs endpoint with potentially malicious SQL syntax in the &lsquo;col&rsquo; parameter.</li>
<li>Upgrade Fuel CMS to a patched version that addresses CVE-2021-47980, if available from the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>cve-2021-47980</category><category>sql-injection</category><category>web-application</category></item></channel></rss>