<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2021-47956 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2021-47956/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:20:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2021-47956/feed.xml" rel="self" type="application/rss+xml"/><item><title>EgavilanMedia PHPCRUD 1.0 SQL Injection Vulnerability (CVE-2021-47956)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47956-phpcrud-sqli/</link><pubDate>Sat, 16 May 2026 16:20:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47956-phpcrud-sqli/</guid><description>EgavilanMedia PHPCRUD 1.0 is vulnerable to SQL injection (CVE-2021-47956), allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the firstname parameter in a POST request to insert.php, potentially extracting sensitive database information.</description><content:encoded><![CDATA[<p>EgavilanMedia PHPCRUD version 1.0 is susceptible to SQL injection, as identified by CVE-2021-47956. This vulnerability allows unauthenticated attackers to inject malicious SQL code through the <code>firstname</code> parameter. By sending crafted POST requests to the <code>insert.php</code> endpoint, attackers can manipulate database queries to extract sensitive information. Successful exploitation of this flaw could lead to unauthorized access to data stored within the application&rsquo;s database. This vulnerability poses a significant risk to systems running the affected version of PHPCRUD due to the ease of exploitation and potential for significant data compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a PHPCRUD 1.0 instance.</li>
<li>Attacker crafts a malicious SQL injection payload.</li>
<li>Attacker sends an HTTP POST request to <code>/insert.php</code>.</li>
<li>The POST request includes the crafted SQL injection payload in the <code>firstname</code> parameter.</li>
<li>The application&rsquo;s <code>insert.php</code> script processes the POST request without proper sanitization.</li>
<li>The unsanitized <code>firstname</code> parameter is incorporated into an SQL query.</li>
<li>The malicious SQL query is executed against the database.</li>
<li>The attacker extracts sensitive data from the database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows an attacker to read, modify, or delete sensitive information within the PHPCRUD 1.0 database. This may include user credentials, personal data, or other confidential application data. The CVSS v3.1 score of 8.2 highlights the high severity, reflecting the potential for significant data compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates provided by EgavilanMedia to address CVE-2021-47956 to remediate the SQL injection vulnerability.</li>
<li>Implement the Sigma rule &ldquo;Detect CVE-2021-47956 Exploitation — PHPCRUD SQL Injection&rdquo; to identify potential exploitation attempts targeting the vulnerable insert.php endpoint.</li>
<li>Review and sanitize all user inputs, especially those passed via HTTP POST requests, to prevent SQL injection attacks.</li>
<li>Implement parameterized queries or prepared statements to prevent SQL injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2021-47956</category></item></channel></rss>