<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Redaxo — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/redaxo/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 17 May 2026 13:18:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/redaxo/feed.xml" rel="self" type="application/rss+xml"/><item><title>Redaxo CMS MyEvents Addon SQL Injection Vulnerability (CVE-2018-25319)</title><link>https://feed.craftedsignal.io/briefs/2026-05-redaxo-sqli/</link><pubDate>Sun, 17 May 2026 13:18:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-redaxo-sqli/</guid><description>Redaxo CMS Addon MyEvents version 2.2.1 contains an SQL injection vulnerability (CVE-2018-25319) that allows authenticated attackers to manipulate database queries by injecting SQL code through the myevents_id parameter, enabling the extraction or modification of sensitive database information.</description><content:encoded><![CDATA[<p>Redaxo CMS is vulnerable to SQL injection in the MyEvents Addon version 2.2.1. CVE-2018-25319 allows authenticated attackers to inject arbitrary SQL commands via the <code>myevents_id</code> parameter. Successful exploitation allows attackers to manipulate database queries, potentially leading to information disclosure or data modification. This vulnerability requires the attacker to be authenticated, limiting the scope of potential attackers. However, exploitation is relatively straightforward, involving crafted GET requests.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the Redaxo CMS instance.</li>
<li>The attacker crafts a malicious GET request targeting the <code>/redaxo/index.php?addon=myevents&amp;page=event_add</code> endpoint.</li>
<li>The crafted GET request includes a <code>myevents_id</code> parameter containing SQL injection payload. For example, <code>myevents_id=1' AND 1=1;--</code>.</li>
<li>The web application processes the request and executes the injected SQL code against the database.</li>
<li>The injected SQL query allows the attacker to extract sensitive information such as usernames, passwords, or other database content.</li>
<li>The attacker analyzes the retrieved data to identify further attack vectors or sensitive information.</li>
<li>The attacker modifies database records to escalate privileges or deface the website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2018-25319) can lead to unauthorized access to sensitive data, including user credentials and confidential information stored in the Redaxo CMS database. Attackers could potentially escalate their privileges, modify website content, or compromise the entire system. The severity is rated as High with a CVSS score of 7.1.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for the Redaxo CMS MyEvents Addon to remediate CVE-2018-25319.</li>
<li>Deploy the Sigma rule <code>Detect CVE-2018-25319 Exploitation — Redaxo MyEvents SQL Injection</code> to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious GET requests to <code>/redaxo/index.php?addon=myevents&amp;page=event_add</code> with unusual characters in the <code>myevents_id</code> parameter (see IOCs).</li>
<li>Implement input validation and sanitization for all user-supplied data, especially for parameters used in database queries.</li>
<li>Enforce least privilege principles to limit the impact of potential SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2018-25319</category><category>redaxo</category></item></channel></rss>