<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sql-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/sql-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 05:16:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/sql-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>Shandong Hoteam PDM Product Data Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-hoteam-pdm-sqli/</link><pubDate>Mon, 04 May 2026 05:16:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-hoteam-pdm-sqli/</guid><description>Shandong Hoteam Software PDM Product Data Management System up to version 8.3.9 is vulnerable to SQL injection via manipulation of the SortOrder argument in the GetQueryMachineGridOnePageData function of the /Base/BaseService.asmx/DataService file, allowing remote attackers to potentially execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>Shandong Hoteam Software&rsquo;s PDM Product Data Management System before version 8.3.10 is susceptible to a SQL injection vulnerability. The vulnerability exists in the <code>/Base/BaseService.asmx/DataService</code> file, specifically affecting the <code>GetQueryMachineGridOnePageData</code> function. By manipulating the <code>SortOrder</code> argument, a remote attacker can inject malicious SQL queries into the system. Successful exploitation could lead to unauthorized data access, modification, or even complete system compromise. Organizations using versions prior to 8.3.10 are urged to upgrade immediately to mitigate the risk. This vulnerability was reported on May 4, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Shandong Hoteam PDM instance running a version prior to 8.3.10.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/Base/BaseService.asmx/DataService</code> endpoint.</li>
<li>Within the HTTP request, the attacker modifies the <code>SortOrder</code> argument.</li>
<li>The <code>SortOrder</code> argument is injected with SQL code.</li>
<li>The application fails to properly sanitize the attacker-supplied SQL code.</li>
<li>The application executes the attacker-controlled SQL query against the backend database.</li>
<li>The attacker gains unauthorized access to sensitive data stored within the database.</li>
<li>The attacker exfiltrates the data or uses it for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows remote attackers to execute arbitrary SQL commands on the affected system. This can lead to unauthorized access to sensitive data, modification of data, or even complete compromise of the database server. Organizations using vulnerable versions of Shandong Hoteam PDM Product Data Management System could suffer significant data breaches, financial losses, and reputational damage. There are no specific victim counts or sector targeting available, but this could affect any organization utilizing the vulnerable PDM system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Shandong Hoteam Software PDM Product Data Management System to version 8.3.10 or later to remediate the vulnerability as mentioned in the overview.</li>
<li>Implement the provided Sigma rule <code>Detect Hoteam PDM SQL Injection Attempt</code> to identify malicious requests targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious requests containing potentially malicious SQL syntax in the <code>SortOrder</code> parameter, as described in the attack chain.</li>
<li>Implement proper input validation and sanitization techniques to prevent SQL injection vulnerabilities in web applications, mitigating similar risks in the future.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7727</category><category>webserver</category></item><item><title>Acrel ECEMS SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-acrel-sql-injection/</link><pubDate>Sun, 03 May 2026 12:15:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-acrel-sql-injection/</guid><description>A SQL injection vulnerability in Acrel Electrical ECEMS Enterprise Microgrid Energy Efficiency Management System 1.3.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file.</description><content:encoded><![CDATA[<p>Acrel Electrical&rsquo;s ECEMS Enterprise Microgrid Energy Efficiency Management System version 1.3.0 is vulnerable to SQL injection. The vulnerability resides in the <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code> file, where manipulation of the <code>fCircuitids</code> argument allows for the injection of arbitrary SQL commands. The vulnerability, identified as CVE-2026-7694, can be exploited remotely without authentication, posing a significant risk to systems exposed to the network. The vendor was notified but did not respond, and a public exploit is available, increasing the likelihood of exploitation. This flaw allows attackers to potentially access, modify, or delete sensitive data within the ECEMS database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an accessible instance of Acrel ECEMS 1.3.0.</li>
<li>Attacker crafts a malicious SQL payload designed to extract sensitive information or modify the database.</li>
<li>The attacker sends a crafted HTTP request to <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code> with the SQL payload embedded in the <code>fCircuitids</code> parameter.</li>
<li>The ECEMS application fails to properly sanitize the <code>fCircuitids</code> input.</li>
<li>The application executes the attacker-supplied SQL query against the database.</li>
<li>The database server processes the malicious query, potentially returning sensitive data or executing harmful commands.</li>
<li>The attacker receives the output of the injected SQL query.</li>
<li>The attacker uses the extracted information for further malicious activities, such as data exfiltration, privilege escalation, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could allow an attacker to read sensitive information from the ECEMS database, modify existing data, or even gain administrative access to the system. This could lead to the compromise of energy efficiency management data, potentially impacting grid stability and financial records. Given the lack of vendor response and the availability of a public exploit, organizations using the affected software are at high risk. The impact includes potential data breaches, system outages, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious requests to <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code> containing potentially malicious SQL syntax within the <code>fCircuitids</code> parameter (see Sigma rule &ldquo;Detect Acrel ECEMS SQL Injection Attempt&rdquo;).</li>
<li>Deploy the Sigma rule &ldquo;Detect SQL Injection Error Messages&rdquo; to identify potential SQL injection attempts across all web applications.</li>
<li>Apply input validation and sanitization to all user-supplied input, especially the <code>fCircuitids</code> parameter in <code>/SubstationWEBV2/main/elecMaxMinAvgValue</code>, to prevent SQL injection.</li>
<li>Consider deploying a web application firewall (WAF) to filter out malicious requests targeting this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7694</category><category>webserver</category></item><item><title>Jinher OA 1.0 SQL Injection Vulnerability (CVE-2026-7670)</title><link>https://feed.craftedsignal.io/briefs/2024-01-jinher-oa-sqli/</link><pubDate>Sat, 02 May 2026 23:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-jinher-oa-sqli/</guid><description>Jinher OA 1.0 is vulnerable to remote SQL injection via the DeptIDList parameter in the /C6/JHSoft.Web.PlanSummarize/UserSel.aspx file, potentially allowing attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-7670, affects Jinher OA 1.0, a web-based office automation software. The vulnerability resides within the /C6/JHSoft.Web.PlanSummarize/UserSel.aspx file, specifically in how the application handles the &lsquo;DeptIDList&rsquo; argument. An unauthenticated remote attacker can manipulate this argument to inject malicious SQL code into database queries. The vulnerability was reported to the vendor; however, there has been no response, and an exploit is publicly available. This lack of response and the availability of an exploit increases the risk to organizations using the affected Jinher OA 1.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Jinher OA 1.0 instance exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/C6/JHSoft.Web.PlanSummarize/UserSel.aspx</code> endpoint.</li>
<li>The request includes a modified <code>DeptIDList</code> parameter containing SQL injection payloads.</li>
<li>The server-side application fails to properly sanitize or validate the <code>DeptIDList</code> input.</li>
<li>The unsanitized input is passed directly into a SQL query executed against the underlying database.</li>
<li>The injected SQL code is executed by the database server, potentially allowing the attacker to bypass authentication, extract sensitive data, or modify data.</li>
<li>The attacker retrieves sensitive information, such as user credentials, internal configurations, or financial data, depending on the database structure and injected SQL commands.</li>
<li>The attacker leverages compromised data to gain further access, escalate privileges, or conduct lateral movement within the organization&rsquo;s network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7670) can lead to unauthorized access to sensitive data, including user credentials, financial records, and internal communications. An attacker could potentially gain complete control over the affected Jinher OA 1.0 system and the underlying database. This could result in significant data breaches, financial losses, reputational damage, and disruption of business operations. Given the lack of vendor response, organizations using Jinher OA 1.0 are particularly vulnerable and should take immediate action to mitigate this risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for requests to <code>/C6/JHSoft.Web.PlanSummarize/UserSel.aspx</code> containing suspicious characters or SQL keywords within the <code>DeptIDList</code> parameter, as covered by the Sigma rule &ldquo;Detect Jinher OA SQL Injection Attempt via DeptIDList&rdquo;.</li>
<li>Apply input validation and sanitization to all user-supplied data, especially the <code>DeptIDList</code> parameter in <code>/C6/JHSoft.Web.PlanSummarize/UserSel.aspx</code>, to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Generic SQL Injection Attempt&rdquo; to identify broader SQL injection attempts across your web applications.</li>
<li>Given the vendor&rsquo;s lack of response, consider isolating the affected Jinher OA 1.0 instance from the network or replacing it with a more secure alternative.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sql-injection</category><category>cve-2026-7670</category><category>web-application</category></item><item><title>code-projects Online Hospital Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-online-hospital-management-sql-injection/</link><pubDate>Sat, 02 May 2026 14:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-online-hospital-management-sql-injection/</guid><description>CVE-2026-7632 is a SQL injection vulnerability in code-projects Online Hospital Management System 1.0, allowing a remote attacker to execute arbitrary SQL commands by manipulating the 'delid' argument in the '/viewappointment.php' file.</description><content:encoded><![CDATA[<p>CVE-2026-7632 is a critical security flaw affecting code-projects Online Hospital Management System version 1.0. The vulnerability lies within the <code>/viewappointment.php</code> file, where insufficient input validation allows for SQL injection via the <code>delid</code> argument. A remote attacker can exploit this vulnerability to inject arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The exploit is publicly disclosed, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to organizations using the affected system, as it could compromise sensitive patient data and disrupt hospital operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of code-projects Online Hospital Management System 1.0 running the vulnerable <code>/viewappointment.php</code> script.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/viewappointment.php</code> with a specially crafted <code>delid</code> parameter containing SQL injection payloads.</li>
<li>The application fails to properly sanitize the <code>delid</code> input, allowing the injected SQL code to be passed to the database.</li>
<li>The injected SQL code is executed against the database server.</li>
<li>The attacker retrieves sensitive data such as patient records, usernames, and passwords from the database using SQL queries like <code>UNION SELECT</code>.</li>
<li>The attacker may modify or delete data within the database.</li>
<li>The attacker could potentially escalate privileges within the application by manipulating user roles or injecting administrative accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7632 can lead to severe consequences, including unauthorized access to sensitive patient data, such as medical history, personal information, and financial records. Attackers could modify or delete critical data, disrupting hospital operations and potentially impacting patient care. The vulnerability could also allow attackers to gain control of the system, leading to further malicious activities like data exfiltration or ransomware deployment. This poses a significant risk to the privacy and security of patient information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SQL Injection in Online Hospital Management System</code> to your SIEM to identify exploitation attempts targeting the <code>/viewappointment.php</code> endpoint.</li>
<li>Implement input validation and sanitization measures in the <code>/viewappointment.php</code> script to prevent SQL injection attacks.</li>
<li>Upgrade to a patched version of code-projects Online Hospital Management System that addresses CVE-2026-7632 (if available).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4061)</title><link>https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sql-injection/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sql-injection/</guid><description>A time-based SQL injection vulnerability (CVE-2026-4061) exists in the Geo Mashup WordPress plugin (&lt;= 1.13.18) due to insufficient sanitization of the 'map_post_type' parameter, enabling unauthenticated attackers to extract sensitive information via time-based blind SQL injection if the Geo Search feature is enabled.</description><content:encoded><![CDATA[<p>The Geo Mashup plugin for WordPress is vulnerable to time-based SQL injection, as detailed in CVE-2026-4061. This vulnerability affects all versions of the plugin up to and including 1.13.18. The root cause lies in the <code>SearchResults</code> hook, where the <code>map_post_type</code> parameter is mishandled. Specifically, the code first calls <code>stripslashes_deep($_POST)</code>, effectively removing WordPress&rsquo;s magic quotes protection. Subsequently, the unsanitized <code>map_post_type</code> value is directly concatenated into an <code>IN(...)</code> clause without proper escaping using <code>esc_sql()</code> or <code>$wpdb-&gt;prepare()</code>. While the &lsquo;any&rsquo; branch of the code correctly applies <code>array_map('esc_sql', ...)</code>, the alternative branch lacks this crucial sanitization step. Successful exploitation requires the Geo Search feature to be enabled in the plugin&rsquo;s settings. This vulnerability allows unauthenticated attackers to inject malicious SQL queries, potentially leading to the extraction of sensitive database information through time-based blind techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a WordPress site using a vulnerable version of the Geo Mashup plugin (&lt;= 1.13.18) with the Geo Search feature enabled.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>SearchResults</code> hook with a specially crafted <code>map_post_type</code> parameter containing SQL injection payload.</li>
<li>The vulnerable code within the Geo Mashup plugin processes the POST request, removing magic quotes using <code>stripslashes_deep($_POST)</code>.</li>
<li>The unsanitized <code>map_post_type</code> value is then concatenated directly into an SQL query within an <code>IN(...)</code> clause without proper escaping.</li>
<li>The injected SQL code executes within the database query, allowing the attacker to manipulate the query&rsquo;s behavior.</li>
<li>The attacker uses time-based SQL injection techniques (e.g., <code>IF(condition, SLEEP(5), 0)</code>) within the injected payload to infer information based on the response time.</li>
<li>By repeatedly sending modified requests and observing the response times, the attacker can extract sensitive data, character by character, from the database.</li>
<li>The attacker extracts sensitive information such as usernames, passwords, API keys, or other confidential data stored in the WordPress database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to extract sensitive information from the WordPress database. The severity of the impact depends on the sensitivity of the data stored in the database, but could include exposure of user credentials, confidential business data, or other sensitive information. Because it affects any installation with the Geo Search feature enabled, a large number of websites using the Geo Mashup plugin may be vulnerable. The CVSS v3.1 base score is 7.5, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Geo Mashup plugin to the latest version (later than 1.13.18) to patch CVE-2026-4061.</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts targeting the vulnerable <code>SearchResults</code> hook using a malicious <code>map_post_type</code> parameter.</li>
<li>Review web server logs for suspicious POST requests to <code>/wp-admin/admin-ajax.php</code> (common AJAX endpoint in WordPress) containing potentially malicious SQL injection payloads in the <code>map_post_type</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>plugin</category></item><item><title>SQL Injection Vulnerability in itsourcecode Courier Management System</title><link>https://feed.craftedsignal.io/briefs/2026-05-courier-mgmt-sqli/</link><pubDate>Fri, 01 May 2026 20:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-courier-mgmt-sqli/</guid><description>itsourcecode Courier Management System 1.0 is vulnerable to SQL Injection via the ID parameter in /edit_staff.php, potentially allowing remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>itsourcecode Courier Management System 1.0 is vulnerable to a SQL injection vulnerability. The vulnerability resides in the <code>/edit_staff.php</code> file and can be exploited by manipulating the <code>ID</code> argument. This allows a remote attacker to inject malicious SQL queries, potentially leading to unauthorized data access, modification, or deletion. The exploit is publicly available, increasing the risk of exploitation. The vulnerability was reported on May 1, 2026, and affects version 1.0 of the Courier Management System.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the <code>/edit_staff.php</code> endpoint in the Courier Management System 1.0.</li>
<li>The attacker crafts a malicious SQL injection payload within the <code>ID</code> parameter of a HTTP GET or POST request.</li>
<li>The attacker sends the crafted request to the <code>/edit_staff.php</code> endpoint.</li>
<li>The application fails to properly sanitize the <code>ID</code> parameter, allowing the SQL injection payload to be processed by the database.</li>
<li>The injected SQL query is executed against the database, potentially allowing the attacker to bypass authentication or authorization controls.</li>
<li>The attacker retrieves sensitive information from the database, such as user credentials, financial records, or other confidential data.</li>
<li>The attacker modifies data in the database, potentially altering application behavior or causing data corruption.</li>
<li>The attacker gains full control of the database server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could allow attackers to read, modify, or delete sensitive data within the Courier Management System database. This could lead to unauthorized access to customer information, financial data, and other confidential records. Given the public availability of the exploit, organizations using Courier Management System 1.0 are at a high risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>ID</code> parameter in <code>/edit_staff.php</code> to prevent SQL injection (CVE-2026-7592).</li>
<li>Deploy the provided Sigma rule to detect potential SQL injection attempts targeting the <code>/edit_staff.php</code> endpoint.</li>
<li>Implement a web application firewall (WAF) rule to block known SQL injection payloads (CVE-2026-7592).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-pharmacy-sqli/</link><pubDate>Fri, 01 May 2026 05:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pharmacy-sqli/</guid><description>SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to remote SQL injection via the ID parameter in the /ajax.php?action=delete_customer endpoint, allowing attackers to potentially read, modify, or delete database information.</description><content:encoded><![CDATA[<p>On May 1, 2026, a SQL injection vulnerability, CVE-2026-7549, was disclosed in SourceCodester Pharmacy Sales and Inventory System version 1.0. The vulnerability resides in the <code>/ajax.php?action=delete_customer</code> endpoint, where the <code>ID</code> parameter is susceptible to manipulation, enabling remote attackers to inject arbitrary SQL commands. Publicly available exploit code exists, increasing the risk of exploitation. Successful exploitation can lead to unauthorized data access, modification, or deletion within the application&rsquo;s database. This vulnerability is particularly concerning due to the sensitive nature of pharmacy data, potentially impacting confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies the vulnerable <code>/ajax.php?action=delete_customer</code> endpoint in SourceCodester Pharmacy Sales and Inventory System 1.0.</li>
<li>Attacker crafts a malicious HTTP request targeting the vulnerable endpoint.</li>
<li>The malicious request includes a manipulated <code>ID</code> parameter containing a SQL injection payload.</li>
<li>The application fails to properly sanitize the <code>ID</code> parameter before incorporating it into a SQL query.</li>
<li>The injected SQL code is executed against the application&rsquo;s database.</li>
<li>The attacker gains unauthorized access to sensitive data, such as customer information, prescription details, or inventory levels.</li>
<li>The attacker may modify or delete data within the database, potentially disrupting pharmacy operations or causing data integrity issues.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7549) can lead to the complete compromise of the SourceCodester Pharmacy Sales and Inventory System database. Attackers could potentially exfiltrate sensitive patient data, modify prescription information, or disrupt pharmacy operations by deleting critical data. The vulnerability has a CVSS v3.1 score of 7.3 (HIGH), indicating a significant risk. The number of victims and specific sectors targeted remain unknown, but any pharmacy using the affected version is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to all user-supplied input, especially the <code>ID</code> parameter in <code>/ajax.php?action=delete_customer</code>, to prevent SQL injection (CWE-89).</li>
<li>Deploy the Sigma rule &ldquo;Detect SQL Injection Attempts in Pharmacy Sales System&rdquo; to identify and block malicious requests targeting the vulnerable endpoint.</li>
<li>Upgrade to a patched version of SourceCodester Pharmacy Sales and Inventory System that addresses CVE-2026-7549 once available.</li>
<li>Monitor web server logs for suspicious activity, such as unusual requests to <code>/ajax.php?action=delete_customer</code>, to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-pharmacy-inventory-sql-injection/</link><pubDate>Fri, 01 May 2026 05:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pharmacy-inventory-sql-injection/</guid><description>CVE-2026-7550 is an SQL injection vulnerability in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID argument in the /ajax.php?action=save_customer endpoint.</description><content:encoded><![CDATA[<p>SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to SQL injection via the /ajax.php?action=save_customer endpoint. Disclosed on May 1, 2026, the vulnerability, identified as CVE-2026-7550, allows unauthenticated remote attackers to inject arbitrary SQL commands by manipulating the <code>ID</code> argument. The vulnerability exists due to insufficient input validation. Public exploit code is available, increasing the risk of exploitation. This vulnerability allows attackers to potentially read, modify, or delete sensitive data within the application&rsquo;s database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the vulnerable endpoint <code>/ajax.php?action=save_customer</code> within the Pharmacy Sales and Inventory System 1.0 application.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/ajax.php?action=save_customer</code> endpoint.</li>
<li>The crafted request includes a manipulated <code>ID</code> parameter designed to inject SQL commands.</li>
<li>The application fails to properly sanitize the input provided in the <code>ID</code> parameter.</li>
<li>The application executes the attacker-supplied SQL code against the database.</li>
<li>The attacker can retrieve sensitive information, such as customer details, product information, or administrative credentials.</li>
<li>The attacker may modify existing data, such as prices or inventory levels.</li>
<li>The attacker may gain complete control of the database, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7550) can lead to unauthorized access to sensitive data, data modification, or complete database compromise. This could result in financial losses, reputational damage, and legal repercussions for affected organizations. Given the nature of the application, attackers could potentially access patient data or prescription information, leading to severe privacy breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>ID</code> parameter in the <code>/ajax.php?action=save_customer</code> endpoint to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/ajax.php?action=save_customer</code> endpoint with unusual <code>ID</code> parameter values. Deploy the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Consider using a Web Application Firewall (WAF) to filter out malicious requests targeting this vulnerability.</li>
<li>Upgrade to a patched version of the SourceCodester Pharmacy Sales and Inventory System once available.</li>
<li>Implement regular database backups to mitigate potential data loss due to successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-7550</category></item><item><title>XATABoost CMS 1.0.0 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-xataboost-sql-injection/</link><pubDate>Wed, 29 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-xataboost-sql-injection/</guid><description>XATABoost CMS 1.0.0 is vulnerable to union-based SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the id parameter via GET requests to news.php, enabling extraction of sensitive database information.</description><content:encoded><![CDATA[<p>XATABoost CMS 1.0.0 is susceptible to a union-based SQL injection vulnerability (CVE-2018-25300). This flaw enables unauthenticated attackers to inject malicious SQL code through the <code>id</code> parameter in <code>news.php</code> via GET requests. By crafting specific payloads, attackers can manipulate database queries to extract sensitive information. This vulnerability poses a significant risk, as it could lead to data breaches, account compromise, and further exploitation of the affected system. The targeted exploitation vector is the <code>news.php</code> file, making it a critical area for monitoring and mitigation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the <code>news.php</code> endpoint.</li>
<li>The attacker crafts a malicious GET request targeting the <code>id</code> parameter within <code>news.php</code>. This payload contains SQL injection code.</li>
<li>The server-side application fails to properly sanitize the <code>id</code> parameter before constructing the SQL query.</li>
<li>The injected SQL code is executed against the database.</li>
<li>The attacker uses UNION clauses to extract sensitive information from other database tables.</li>
<li>The extracted data is returned as part of the HTTP response.</li>
<li>The attacker parses the HTTP response to retrieve the exfiltrated data.</li>
<li>The attacker uses the exfiltrated data for further malicious activities (e.g., privilege escalation, lateral movement).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can result in the unauthorized disclosure of sensitive information stored in the XATABoost CMS database. This includes user credentials, financial data, or other confidential information. The impact could range from a single compromised system to a full-scale data breach, depending on the scope and sensitivity of the data stored within the database. Without further context on affected deployments, the number of potential victims is hard to quantify, but any public-facing XATABoost CMS 1.0.0 instance is vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect XATABoost CMS SQL Injection Attempt</code> to identify malicious GET requests targeting the <code>news.php</code> endpoint and tune for your environment.</li>
<li>Implement input validation and sanitization on the <code>id</code> parameter in the <code>news.php</code> file to prevent SQL injection attacks.</li>
<li>Upgrade to a patched version of XATABoost CMS or implement a web application firewall (WAF) rule to mitigate the vulnerability.</li>
<li>Monitor web server logs for suspicious activity related to <code>news.php</code> and unusual SQL queries.</li>
<li>Review and restrict database user permissions to minimize the impact of successful SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve</category></item><item><title>EyouCMS SQL Injection Vulnerability (CVE-2026-7389)</title><link>https://feed.craftedsignal.io/briefs/2026-04-eyoucms-sql-injection/</link><pubDate>Wed, 29 Apr 2026 16:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-eyoucms-sql-injection/</guid><description>A remote SQL injection vulnerability (CVE-2026-7389) exists in EyouCMS versions up to 1.7.9 due to improper handling of the 'sort_asc' argument in the GetSortData function, potentially allowing attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>A security vulnerability, CVE-2026-7389, has been identified in EyouCMS, specifically affecting versions up to 1.7.9. This vulnerability stems from insufficient sanitization of user-supplied input passed to the <code>sort_asc</code> argument of the <code>GetSortData</code> function located in the <code>application/common.php</code> file. An unauthenticated, remote attacker can exploit this vulnerability to inject malicious SQL queries into the application. Publicly available exploits increase the risk of widespread exploitation. The project maintainers were notified but have not yet addressed the issue, making timely detection and mitigation critical for defenders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an EyouCMS instance running a vulnerable version (&lt;= 1.7.9).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>GetSortData</code> function within <code>application/common.php</code>.</li>
<li>The crafted request includes a manipulated <code>sort_asc</code> argument containing a SQL injection payload.</li>
<li>The application processes the request without proper sanitization of the <code>sort_asc</code> parameter.</li>
<li>The unsanitized input is incorporated into a SQL query executed by the application.</li>
<li>The injected SQL code modifies the query logic, allowing the attacker to potentially bypass authentication.</li>
<li>The attacker can read sensitive data from the database, such as user credentials or configuration information.</li>
<li>The attacker may escalate privileges or gain complete control of the database server, leading to data exfiltration or service disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7389) could allow an attacker to read, modify, or delete sensitive data stored in the EyouCMS database. This could include user credentials, financial information, or other confidential data. Since an exploit is publicly available, organizations using vulnerable versions of EyouCMS are at increased risk of compromise, potentially leading to data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect EyouCMS SQL Injection via sort_asc Parameter</code> to identify exploitation attempts in web server logs.</li>
<li>Inspect web server logs for suspicious requests targeting <code>application/common.php</code> with unusual parameters in the <code>sort_asc</code> argument based on the Sigma rule.</li>
<li>Apply input validation and sanitization to the <code>sort_asc</code> parameter in the <code>GetSortData</code> function to prevent SQL injection.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7389</category><category>web-application</category></item><item><title>dubydu sqlite-mcp SQL Injection Vulnerability (CVE-2026-7206)</title><link>https://feed.craftedsignal.io/briefs/2026-04-sqlite-injection/</link><pubDate>Tue, 28 Apr 2026 01:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sqlite-injection/</guid><description>A SQL injection vulnerability exists in dubydu sqlite-mcp version 0.1.0 and earlier within the extract_to_json function allowing remote exploitation through manipulation of the output_filename argument.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-7206, has been discovered in dubydu&rsquo;s sqlite-mcp software, affecting versions up to 0.1.0. The vulnerability resides within the <code>extract_to_json</code> function located in the <code>src/entry.py</code> file. An attacker can exploit this flaw by manipulating the <code>output_filename</code> argument, leading to the execution of arbitrary SQL commands. This vulnerability is remotely exploitable, meaning an attacker does not need local access to the system. A proof-of-concept exploit is publicly available, increasing the risk of active exploitation. Applying patch <code>a5580cb992f4f6c308c9ffe6442b2e76709db548</code> is the recommended remediation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of dubydu sqlite-mcp running a version prior to the patched version.</li>
<li>The attacker crafts a malicious request targeting the <code>extract_to_json</code> function in <code>src/entry.py</code>.</li>
<li>The attacker injects SQL code into the <code>output_filename</code> argument of the request.</li>
<li>The application processes the attacker-supplied <code>output_filename</code> argument without proper sanitization.</li>
<li>The unsanitized input is passed directly to the underlying SQLite database engine.</li>
<li>The SQLite database executes the injected SQL commands, potentially allowing the attacker to read sensitive data, modify data, or execute system commands, depending on the application&rsquo;s privileges and database configuration.</li>
<li>The attacker retrieves the results of the injected SQL query, such as extracted data or confirmation of successful command execution.</li>
<li>The attacker leverages the compromised database to achieve further objectives, such as data exfiltration or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7206) can allow an attacker to execute arbitrary SQL queries against the underlying SQLite database. This could lead to the disclosure of sensitive information, modification of data, or even complete compromise of the application and the system it resides on. The CVSS v3.1 base score is 7.3, indicating a high severity vulnerability. Given the public availability of an exploit, affected systems are at an elevated risk of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the provided patch <code>a5580cb992f4f6c308c9ffe6442b2e76709db548</code> to remediate CVE-2026-7206.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection attacks, focusing on the <code>output_filename</code> parameter of the <code>extract_to_json</code> function.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>extract_to_json</code> function using the Sigma rule <code>Detect Suspicious sqlite-mcp Requests</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sql-injection</category><category>cve-2026-7206</category><category>web-application</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability (CVE-2026-7199)</title><link>https://feed.craftedsignal.io/briefs/2026-04-pharmacy-inventory-sqli/</link><pubDate>Tue, 28 Apr 2026 00:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pharmacy-inventory-sqli/</guid><description>A SQL injection vulnerability (CVE-2026-7199) exists in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'ID' parameter in the `/ajax.php?action=delete_product` endpoint, potentially leading to data breach or system compromise.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in SourceCodester Pharmacy Sales and Inventory System version 1.0. This vulnerability, assigned CVE-2026-7199, affects the <code>/ajax.php?action=delete_product</code> endpoint. Attackers can remotely exploit this vulnerability by manipulating the <code>ID</code> parameter. The vulnerability was published on April 27, 2026, and the exploit is now publicly available. Successful exploitation allows attackers to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. Due to the ease of exploitation and the sensitive nature of pharmacy data, this vulnerability poses a significant risk to organizations using the affected system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of SourceCodester Pharmacy Sales and Inventory System 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/ajax.php?action=delete_product</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>ID</code> parameter of the request.</li>
<li>The server-side application fails to properly sanitize the input, passing the malicious SQL code to the database.</li>
<li>The database executes the injected SQL code, potentially allowing the attacker to bypass authentication, access sensitive data, modify database records, or execute system commands.</li>
<li>The attacker retrieves sensitive data, such as patient information, prescription details, or financial records.</li>
<li>The attacker may escalate privileges within the application and the underlying system.</li>
<li>The attacker can then exfiltrate the compromised data or maintain persistent access to the system for future attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to a complete compromise of the Pharmacy Sales and Inventory System. This can result in the theft of sensitive patient data, financial records, and other confidential information. The vulnerability allows attackers to potentially modify or delete critical data, leading to disruption of pharmacy operations, financial losses, and regulatory penalties. As the exploit is publicly available, the likelihood of widespread exploitation is high, impacting any organization using the vulnerable version of the software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the Sigma rule <code>Detecting SQL Injection Attempts via URI</code> to identify potential exploitation attempts against the <code>/ajax.php?action=delete_product</code> endpoint.</li>
<li>Inspect web server logs for requests to <code>/ajax.php?action=delete_product</code> containing suspicious characters or SQL keywords in the <code>ID</code> parameter, as detected by the <code>Detecting SQL Injection in Pharmacy System</code> Sigma rule.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection vulnerabilities in the SourceCodester Pharmacy Sales and Inventory System, mitigating the underlying issue.</li>
<li>Restrict access to the database server and sensitive data to only authorized personnel, reducing the potential impact of a successful SQL injection attack.</li>
<li>Monitor database logs for suspicious activity, such as unauthorized data access or modification, which may indicate successful exploitation of CVE-2026-7199.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7199</category><category>web-application</category></item><item><title>Online Lot Reservation System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-online-lot-sqli/</link><pubDate>Mon, 27 Apr 2026 15:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-online-lot-sqli/</guid><description>CVE-2026-7131 is a SQL injection vulnerability in code-projects Online Lot Reservation System up to version 1.0, affecting the /loginuser.php component via manipulation of the email/password arguments, which could allow remote attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-7131, has been discovered in code-projects Online Lot Reservation System version 1.0 and earlier. This vulnerability is located in the <code>/loginuser.php</code> file and can be exploited by manipulating the <code>email</code> and <code>password</code> arguments. Successful exploitation could allow a remote attacker to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. The vulnerability is remotely exploitable and a public exploit is available, increasing the risk of exploitation. Due to the sensitive nature of lot reservation data, organizations using this system are at risk of significant data compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of code-projects Online Lot Reservation System version 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/loginuser.php</code> file.</li>
<li>Within the request, the attacker injects SQL code into the <code>email</code> or <code>password</code> parameters.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL code to the database.</li>
<li>The database executes the injected SQL code, treating it as a legitimate query.</li>
<li>The attacker gains unauthorized access to the database, potentially reading sensitive information such as user credentials, reservation details, or financial data.</li>
<li>The attacker may modify or delete data within the database, disrupting the system&rsquo;s functionality.</li>
<li>The attacker can potentially use the compromised database to pivot to other systems or escalate privileges within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7131 can result in unauthorized access to sensitive data within the Online Lot Reservation System. This could include user credentials, reservation details, and financial information. The vulnerability affects systems running code-projects Online Lot Reservation System up to version 1.0. Due to the availability of a public exploit, the risk of exploitation is elevated. A successful attack could lead to data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization techniques to prevent SQL injection attacks within the <code>/loginuser.php</code> file.</li>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempt via Login</code> to identify potential exploitation attempts against the <code>/loginuser.php</code> endpoint.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/loginuser.php</code> file, specifically looking for SQL syntax within the <code>email</code> or <code>password</code> parameters.</li>
<li>Review and harden database access controls to limit the impact of successful SQL injection attacks.</li>
<li>Implement a web application firewall (WAF) with rules to detect and block SQL injection attempts.</li>
<li>Disable Javascript to ensure complete website functionality.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve</category></item><item><title>itsourcecode Construction Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-construction-management-sql-injection/</link><pubDate>Mon, 27 Apr 2026 02:16:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-construction-management-sql-injection/</guid><description>A SQL injection vulnerability exists in itsourcecode Construction Management System version 1.0, affecting the processing of the /locations.php file, allowing a remote attacker to inject SQL commands by manipulating the 'address' argument, with a publicly available exploit.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in itsourcecode Construction Management System version 1.0. The vulnerability resides within the <code>/locations.php</code> file and is triggered by manipulating the <code>address</code> argument. This allows a remote attacker to inject arbitrary SQL commands into the application&rsquo;s database queries. This poses a significant risk as successful exploitation could lead to unauthorized data access, modification, or deletion, potentially compromising the entire system. The vulnerability has been assigned CVE-2026-7075, and a public exploit is available, increasing the likelihood of exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of itsourcecode Construction Management System 1.0.</li>
<li>Attacker sends a crafted HTTP request to <code>/locations.php</code> with a malicious SQL payload embedded in the <code>address</code> parameter.</li>
<li>The application fails to properly sanitize the <code>address</code> parameter.</li>
<li>The unsanitized input is incorporated into an SQL query.</li>
<li>The database executes the attacker-controlled SQL query.</li>
<li>The attacker extracts sensitive data from the database.</li>
<li>Attacker may use the injected queries to modify or delete data.</li>
<li>The attacker compromises the confidentiality, integrity, and availability of the Construction Management System.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7075) can lead to unauthorized access to sensitive data, including user credentials, financial records, and project details stored within the Construction Management System database. Attackers could potentially modify or delete critical data, disrupt business operations, or gain complete control over the application and its underlying infrastructure. Given the public availability of the exploit, organizations using the affected version of itsourcecode Construction Management System are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect suspicious HTTP requests to <code>/locations.php</code> containing potentially malicious SQL syntax in the <code>cs-uri-query</code> (webserver logs).</li>
<li>Implement input validation and sanitization for the <code>address</code> parameter in <code>/locations.php</code> to prevent SQL injection attacks.</li>
<li>Monitor web server logs for unusual activity, especially requests targeting <code>/locations.php</code> with long or complex <code>address</code> parameters.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-7075</category></item><item><title>CodePanda Source canteen_management_system SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-canteen-sql-injection/</link><pubDate>Mon, 27 Apr 2026 01:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-canteen-sql-injection/</guid><description>A SQL injection vulnerability exists in CodePanda Source canteen_management_system version 1.0 within the /api/login.php file by manipulating the Username argument, allowing remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in CodePanda Source canteen_management_system version 1.0. The vulnerability resides in the <code>/api/login.php</code> file and is triggered by manipulating the <code>Username</code> argument. This allows a remote attacker to inject arbitrary SQL commands into the application&rsquo;s database queries. Public exploits are available, increasing the risk of exploitation. Successful exploitation could lead to unauthorized data access, modification, or deletion, potentially compromising the entire application and its underlying database. The affected version is 1.0, and there are no known mitigations other than patching or taking the system offline.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a CodePanda Source canteen_management_system version 1.0 instance accessible over the network.</li>
<li>The attacker sends a crafted HTTP POST request to <code>/api/login.php</code> with a malicious SQL payload in the <code>Username</code> parameter.</li>
<li>The application fails to properly sanitize the <code>Username</code> input before incorporating it into an SQL query.</li>
<li>The injected SQL code is executed against the application&rsquo;s database.</li>
<li>The attacker uses SQL injection techniques such as <code>UNION SELECT</code> to extract sensitive data from the database.</li>
<li>The extracted data, which may include usernames, passwords, and other confidential information, is sent back to the attacker.</li>
<li>The attacker uses the compromised credentials to gain unauthorized access to the application&rsquo;s administrative interface.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could allow attackers to read sensitive data, modify existing records, or even execute arbitrary code on the database server. This could lead to a complete compromise of the application and its underlying data. Given the nature of a canteen management system, potential data breaches could include personal information of employees or customers, financial data related to transactions, and internal operational details. The impact may be amplified if the database stores other sensitive information, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for POST requests to <code>/api/login.php</code> containing SQL syntax within the <code>Username</code> parameter to detect potential exploitation attempts (see example rule below).</li>
<li>Apply input validation and sanitization to all user-supplied input, especially the <code>Username</code> parameter in <code>/api/login.php</code>, to prevent SQL injection.</li>
<li>Monitor database logs for unusual or unauthorized SQL queries originating from the application to identify potential breaches resulting from SQL injection.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7072</category><category>web-application</category></item><item><title>SQL Injection Vulnerability in code-projects Inventory Management System 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-04-inventory-sql-injection/</link><pubDate>Mon, 27 Apr 2026 01:16:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-inventory-sql-injection/</guid><description>A SQL injection vulnerability exists in code-projects Inventory Management System 1.0 within the Login component, specifically affecting the Username argument, where a remote attacker can manipulate the Username parameter, leading to unauthorized data access or modification.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in code-projects Inventory Management System version 1.0. The vulnerability resides within the Login component and is triggered by manipulating the Username argument. Successful exploitation allows a remote attacker to inject malicious SQL queries, potentially leading to unauthorized access to sensitive data, modification of existing records, or even complete database takeover. The vulnerability, identified as CVE-2026-7070, has a CVSS v3.1 score of 7.3, indicating a high severity. Publicly available exploits exist, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to organizations using the affected Inventory Management System, potentially leading to data breaches and financial losses.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a login form within the code-projects Inventory Management System 1.0.</li>
<li>The attacker crafts a malicious SQL injection payload within the Username field of the login form.</li>
<li>The attacker submits the crafted payload through an HTTP POST request to the login endpoint.</li>
<li>The application fails to properly sanitize or validate the input provided in the Username field.</li>
<li>The unsanitized input is directly incorporated into an SQL query executed against the backend database.</li>
<li>The injected SQL code modifies the intended query, allowing the attacker to bypass authentication or extract data.</li>
<li>The database server executes the modified SQL query, potentially returning sensitive information to the attacker or allowing unauthorized data manipulation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can have severe consequences. An attacker can gain unauthorized access to sensitive inventory data, customer information, and financial records. Data modification can lead to incorrect inventory levels, disrupted operations, and financial losses. In a worst-case scenario, the attacker could gain complete control over the database server, leading to a full system compromise. This vulnerability impacts organizations using code-projects Inventory Management System 1.0, potentially affecting their reputation, financial stability, and customer trust.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempts in Web Logs</code> to identify potential exploitation attempts targeting the Username field in web server logs.</li>
<li>Apply input validation and sanitization to the Username field in the Login component of code-projects Inventory Management System 1.0 to mitigate CVE-2026-7070.</li>
<li>Monitor web server logs for unusual SQL syntax or error messages indicative of SQL injection attempts based on the <code>Detect SQL Injection Attempts in Web Logs</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>KLiK SocialMediaWebsite SQL Injection Vulnerability (CVE-2026-7002)</title><link>https://feed.craftedsignal.io/briefs/2026-04-klik-sqli/</link><pubDate>Sun, 26 Apr 2026 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-klik-sqli/</guid><description>KLiK SocialMediaWebsite up to version 1.0.1 is vulnerable to SQL injection via manipulation of the c_id argument in the /includes/get_message_ajax.php file, specifically affecting the Private Message Handler component, which can be exploited remotely.</description><content:encoded><![CDATA[<p>KLiK SocialMediaWebsite version 1.0.1 and earlier is susceptible to a SQL injection vulnerability (CVE-2026-7002) affecting the Private Message Handler component. This vulnerability resides within the <code>/includes/get_message_ajax.php</code> file, and is triggered by manipulating the <code>c_id</code> argument. The attack can be launched remotely without authentication, potentially allowing unauthorized access to sensitive data within the application&rsquo;s database. Defenders should prioritize identifying and mitigating this vulnerability to prevent potential data breaches and unauthorized access to user information. The vulnerability was published on April 25, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a KLiK SocialMediaWebsite instance running version 1.0.1 or earlier.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/includes/get_message_ajax.php</code> endpoint.</li>
<li>The attacker injects a SQL payload into the <code>c_id</code> parameter of the HTTP request.</li>
<li>The web server processes the request and passes the malicious SQL query to the database.</li>
<li>The database executes the injected SQL query without proper sanitization, leading to unintended data retrieval or modification.</li>
<li>The attacker retrieves sensitive information from the database, such as user credentials or private messages.</li>
<li>The attacker may use the stolen credentials to gain unauthorized access to user accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to unauthorized access to sensitive data stored in the KLiK SocialMediaWebsite database. This could include user credentials, private messages, and other personal information. An attacker could potentially gain complete control over the application&rsquo;s data, leading to data breaches, identity theft, and other malicious activities. Given the wide use of social media platforms, a successful attack could affect a large number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for KLiK SocialMediaWebsite to address CVE-2026-7002.</li>
<li>Implement proper input validation and sanitization techniques to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule to detect attempts to exploit this SQL injection vulnerability by monitoring web server logs for suspicious requests targeting <code>/includes/get_message_ajax.php</code> with potentially malicious SQL payloads in the <code>c_id</code> parameter.</li>
<li>Monitor web server logs for HTTP requests to <code>/includes/get_message_ajax.php</code> containing SQL keywords (e.g., <code>SELECT</code>, <code>UNION</code>, <code>UPDATE</code>, <code>INSERT</code>, <code>DELETE</code>) in the <code>c_id</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>vulnerability</category><category>web-application</category></item><item><title>OpenC3 COSMOS SQL Injection Vulnerability in QuestDB Time-Series Database</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-openc3-sql-injection/</link><pubDate>Thu, 23 Apr 2026 14:12:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-openc3-sql-injection/</guid><description>A SQL injection vulnerability exists in the Time-Series Database (TSDB) component of COSMOS, allowing an authenticated remote user to execute arbitrary SQL commands, including telemetry data disclosure and deletion.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in the OpenC3 COSMOS Time-Series Database (TSDB) component, which utilizes QuestDB. The vulnerability resides within the <code>tsdb_lookup</code> function in the <code>cvt_model.rb</code> file, where user-supplied input is directly incorporated into SQL queries without proper sanitization. An authenticated attacker with &ldquo;tlm&rdquo; permissions, which includes Admin, Operator, Viewer, or Runner roles, can exploit this flaw to inject arbitrary SQL commands. This can lead to unauthorized data access, modification, or deletion within the TSDB. The affected versions are OpenC3 rubygems package versions &gt;= 6.7.0 and &lt; 7.0.0-rc3. Successful exploitation allows attackers to compromise the confidentiality, integrity, and availability of telemetry data stored within the COSMOS system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the COSMOS system with a role that possesses &ldquo;tlm&rdquo; permissions (Admin, Operator, Viewer, or Runner).</li>
<li>The attacker crafts a malicious JSON-RPC request targeting the <code>get_tlm_values</code> endpoint.</li>
<li>Within the request body, the attacker injects a SQL payload into the <code>start_time</code> parameter, such as <code>' OR 1=1 --</code>.</li>
<li>The <code>tsdb_lookup</code> function incorporates the unsanitized input into a SQL query.</li>
<li>The injected SQL payload manipulates the query logic, allowing the attacker to bypass intended restrictions.</li>
<li>The attacker can then exfiltrate all telemetry data within the database by manipulating the SQL query.</li>
<li>The attacker modifies the SQL payload to execute arbitrary commands, such as <code>DROP TABLE</code> statements.</li>
<li>The attacker successfully deletes historical data from the database, impacting data availability and system integrity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows an attacker to perform unauthorized actions on the OpenC3 COSMOS Time-Series Database (TSDB). An attacker with &ldquo;tlm&rdquo; permissions can disclose sensitive telemetry data, modify existing data, or delete data altogether. The vulnerability impacts systems running OpenC3 rubygems package versions &gt;= 6.7.0 and &lt; 7.0.0-rc3. Depending on the role of the compromised account and the specific SQL commands executed, an attacker could potentially cause significant disruption to operations relying on the integrity and availability of telemetry data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>rubygems/openc3</code> package to version 7.0.0-rc3 or later to remediate the SQL injection vulnerability.</li>
<li>Implement input sanitization on user-supplied data within the <code>tsdb_lookup</code> function in <code>cvt_model.rb</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious OpenC3 Telemetry Requests&rdquo; to identify potential exploitation attempts targeting the <code>get_tlm_values</code> endpoint.</li>
<li>Review and restrict &ldquo;tlm&rdquo; permissions to the <code>get_tlm_values</code> RPC endpoint according to the principle of least privilege, limiting access to only those users who require it.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>openc3</category><category>cosmos</category><category>questdb</category><category>telemetry</category></item><item><title>Daptin SQL Injection Vulnerability in Aggregate API</title><link>https://feed.craftedsignal.io/briefs/2026-04-daptin-sql-injection/</link><pubDate>Thu, 23 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-daptin-sql-injection/</guid><description>A SQL injection vulnerability exists in Daptin versions prior to 0.11.4 within the `/aggregate/:typename` endpoint, where the `column` and `group` query parameters are passed to `goqu.L()` without validation, allowing authenticated users to inject arbitrary SQL expressions and exfiltrate sensitive data.</description><content:encoded><![CDATA[<p>Daptin versions prior to 0.11.4 are susceptible to a SQL injection vulnerability in the <code>/aggregate/:typename</code> endpoint. The vulnerability arises because the application fails to properly validate the <code>column</code> and <code>group</code> query parameters before passing them to <code>goqu.L()</code>. This function is used to build raw SQL literal expressions, thus bypassing parameterization and allowing attackers to inject arbitrary SQL code. Any authenticated user, regardless of privilege level, can exploit this vulnerability. This poses a significant risk as it enables unauthorized data extraction, disclosure of database internals, and cross-table data exfiltration. The vulnerability was reported on 2026-04-22 and assigned CVE-2026-41422.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Daptin application with valid credentials.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/aggregate/:typename</code> endpoint.</li>
<li>The attacker injects a SQL payload into the <code>column</code> or <code>group</code> query parameters. For example, <code>column=(SELECT group_concat(email) FROM user_account) as leak</code>.</li>
<li>The Daptin application receives the request and passes the unvalidated <code>column</code> parameter to the <code>goqu.L()</code> function in <code>server/resource/resource_aggregate.go</code>.</li>
<li>The <code>goqu.L()</code> function constructs a raw SQL query using the attacker-controlled input, bypassing any parameterization.</li>
<li>The malicious SQL query is executed against the database.</li>
<li>The attacker retrieves the injected SQL query&rsquo;s result from the application&rsquo;s response, which contains sensitive data.</li>
<li>The attacker exfiltrates the extracted data, potentially including user credentials, internal database schema details, or other confidential information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows attackers to perform unauthorized data extraction, including sensitive information like user credentials. An attacker can also disclose database internals and exfiltrate data from multiple tables, even with low-privilege access. The impact includes potential data breaches, compliance violations, and reputational damage. The vulnerability was confirmed to allow extraction of <code>user_account.email</code> values by a non-admin user.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Daptin to version 0.11.4 or later to patch the SQL injection vulnerability (CVE-2026-41422).</li>
<li>Deploy the provided Sigma rule <code>Detect Daptin Aggregate API SQL Injection</code> to identify exploitation attempts in web server logs.</li>
<li>If upgrading is not immediately feasible, implement input validation on the <code>column</code> and <code>group</code> parameters in the <code>/aggregate/:typename</code> endpoint, specifically blocking SQL keywords and functions to mitigate the risk.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category></item><item><title>ElectricSQL /v1/shape API SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-electric-sql-injection/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-electric-sql-injection/</guid><description>The ElectricSQL sync engine is vulnerable to SQL injection, potentially allowing authenticated users to read, write, and destroy the underlying PostgreSQL database.</description><content:encoded><![CDATA[<p>Electric, a Postgres sync engine, is vulnerable to SQL injection in the <code>order_by</code> parameter of the ElectricSQL <code>/v1/shape</code> API endpoint. This vulnerability exists in versions 1.1.12 to before 1.5.0. Exploitation allows any authenticated user to execute arbitrary SQL queries, leading to potential data breaches, data manipulation, and complete database compromise. Successful exploitation can result in unauthorized access to sensitive information, modification of critical data, and denial of service. Organizations using vulnerable versions of ElectricSQL are at high risk. The vulnerability is resolved in version 1.5.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the ElectricSQL application.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/v1/shape</code> API endpoint.</li>
<li>The crafted request includes a SQL injection payload within the <code>order_by</code> parameter.</li>
<li>The ElectricSQL application processes the request without proper sanitization of the <code>order_by</code> parameter.</li>
<li>The malicious SQL payload is executed against the underlying PostgreSQL database.</li>
<li>The attacker leverages the SQL injection vulnerability to extract sensitive data, such as user credentials or proprietary information, using <code>SELECT</code> statements.</li>
<li>The attacker escalates privileges by manipulating database objects or creating new administrative accounts using <code>CREATE</code> and <code>ALTER</code> statements.</li>
<li>The attacker destroys data or renders the database unavailable using <code>DELETE</code> and <code>DROP</code> statements, achieving complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to a complete compromise of the underlying PostgreSQL database. This may result in unauthorized access to sensitive data, including customer information, financial records, and intellectual property. Attackers could also modify or delete data, leading to data loss, service disruption, and reputational damage. Given the potential for complete data destruction, organizations are urged to remediate this vulnerability immediately.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ElectricSQL to version 1.5.0 or later to patch the vulnerability (CVE-2026-40906).</li>
<li>Implement input validation and sanitization for all user-supplied data, especially in the <code>order_by</code> parameter of the <code>/v1/shape</code> API.</li>
<li>Monitor web server logs for suspicious activity, such as unusual characters or SQL keywords in the <code>order_by</code> parameter of requests to the <code>/v1/shape</code> API to enable the &ldquo;Detect Suspicious SQL Injection Attempt in ElectricSQL API Request&rdquo; rule.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Error Messages&rdquo; to identify potential exploitation attempts based on error responses from the database server.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>electricsql</category><category>postgresql</category></item><item><title>Multiple Vulnerabilities in OpenBao Allow for Security Bypass, DoS, and SQL Injection</title><link>https://feed.craftedsignal.io/briefs/2026-04-openbao-vulns/</link><pubDate>Wed, 22 Apr 2026 07:39:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openbao-vulns/</guid><description>Multiple vulnerabilities in OpenBao can be exploited by an attacker to bypass security measures, conduct a denial of service attack, and conduct a SQL injection attack.</description><content:encoded><![CDATA[<p>A security advisory highlights multiple vulnerabilities in OpenBao, a secrets management tool. Successful exploitation of these vulnerabilities could allow an attacker to bypass security measures, leading to unauthorized access or privilege escalation. Additionally, an attacker could leverage these flaws to trigger a denial-of-service (DoS) condition, disrupting the availability of the service. Finally, the advisory indicates a SQL injection vulnerability exists, potentially allowing attackers to read, modify, or delete sensitive data within the OpenBao database. Defenders should prioritize patching or mitigating these vulnerabilities to prevent potential attacks and maintain the confidentiality, integrity, and availability of their secrets management infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable OpenBao instance exposed to a network.</li>
<li>The attacker crafts a malicious SQL query designed to exploit the SQL injection vulnerability.</li>
<li>The attacker sends the crafted SQL query to the vulnerable OpenBao instance through a standard API endpoint.</li>
<li>The OpenBao instance processes the malicious SQL query, inadvertently executing attacker-controlled SQL commands.</li>
<li>The attacker uses the SQL injection vulnerability to bypass authentication or authorization checks, gaining unauthorized access to sensitive data or administrative functions.</li>
<li>Alternatively, the attacker exploits the DoS vulnerability by sending a specially crafted request.</li>
<li>The OpenBao instance becomes overwhelmed, consuming excessive resources and becoming unresponsive.</li>
<li>Legitimate users are unable to access OpenBao, leading to service disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to significant consequences. An attacker could gain unauthorized access to sensitive secrets, such as API keys, passwords, and certificates, which could then be used to compromise other systems. A successful DoS attack could disrupt critical business operations that rely on OpenBao for secrets management. The impact would depend on the scope of secrets managed by OpenBao and the criticality of the affected services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate and remediate the identified SQL injection vulnerabilities in OpenBao by applying the necessary patches or upgrades as soon as they are available from the vendor.</li>
<li>Apply rate limiting and input validation to OpenBao API endpoints to mitigate the potential for denial-of-service attacks.</li>
<li>Monitor web server logs for suspicious SQL queries and unusual API request patterns using the Sigma rule <code>Detect Suspicious OpenBao SQL Injection</code>.</li>
<li>Implement network segmentation and access controls to limit the blast radius in case of a successful compromise.</li>
<li>Monitor OpenBao&rsquo;s resource consumption (CPU, memory, network) for anomalies that could indicate a denial-of-service attack using the Sigma rule <code>Detect OpenBao DoS Attempt</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openbao</category><category>vulnerability</category><category>sql-injection</category><category>dos</category></item><item><title>Metasoft MetaCRM SQL Injection Vulnerability (CVE-2026-6629)</title><link>https://feed.craftedsignal.io/briefs/2026-04-metasoft-crm-sql-injection/</link><pubDate>Mon, 20 Apr 2026 11:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-metasoft-crm-sql-injection/</guid><description>A SQL injection vulnerability (CVE-2026-6629) exists in Metasoft MetaCRM up to version 6.4.0, allowing remote attackers to execute arbitrary SQL commands via manipulation of the sql argument in the Statement.executeUpdate function of the sql.jsp file.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-6629, has been discovered in Metasoft 美特软件 MetaCRM versions up to 6.4.0. The vulnerability resides within the <code>sql.jsp</code> file, specifically affecting the <code>Statement.executeUpdate</code> function of the Interface component. The vulnerability allows remote attackers to inject arbitrary SQL commands by manipulating the <code>sql</code> argument. Public exploit code is available, increasing the risk of exploitation. The vendor was notified but did not respond. This vulnerability poses a significant threat to organizations using the affected MetaCRM versions, potentially leading to data breaches, system compromise, and unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Metasoft MetaCRM instance running a vulnerable version (&lt;= 6.4.0).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>sql.jsp</code> file.</li>
<li>Within the HTTP request, the attacker manipulates the <code>sql</code> parameter to inject SQL code.</li>
<li>The crafted SQL injection payload is passed to the <code>Statement.executeUpdate</code> function.</li>
<li>The application executes the attacker-controlled SQL query against the underlying database.</li>
<li>The database server executes the malicious SQL command.</li>
<li>The attacker can read sensitive data from the database, modify existing data, or execute administrative commands.</li>
<li>The attacker gains unauthorized access to the system, potentially leading to complete system compromise or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to a range of severe consequences, including unauthorized data access, data modification, and complete system compromise. Attackers could steal sensitive customer data, financial records, or intellectual property. They might also be able to modify existing data to cause financial losses or disrupt business operations. The lack of vendor response exacerbates the risk, as no official patch or mitigation is available. The CVSS score of 7.3 reflects the high potential impact of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious POST requests targeting <code>sql.jsp</code> with potentially malicious SQL queries in the <code>sql</code> parameter to detect exploitation attempts. Reference the Sigma rule <code>Detect-Metasoft-MetaCRM-SQL-Injection</code>.</li>
<li>Deploy the Sigma rule <code>Detect-Metasoft-MetaCRM-SQL-Error</code> to detect SQL errors that may indicate injection attempts.</li>
<li>Apply input validation and sanitization to the <code>sql</code> parameter in <code>sql.jsp</code> to prevent SQL injection. This requires modifying the application code.</li>
<li>Monitor network traffic for unusual database activity originating from the web server, such as large data transfers or unauthorized access attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6629</category><category>sql-injection</category><category>web-application</category><category>metasoft</category></item><item><title>Digiwin EasyFlow .NET SQL Injection Vulnerability (CVE-2026-5964)</title><link>https://feed.craftedsignal.io/briefs/2026-04-easyflow-sqli/</link><pubDate>Mon, 20 Apr 2026 08:16:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-easyflow-sqli/</guid><description>Digiwin's EasyFlow .NET is susceptible to a SQL Injection vulnerability, enabling unauthenticated remote attackers to inject arbitrary SQL commands for unauthorized database access, modification, and deletion.</description><content:encoded><![CDATA[<p>EasyFlow .NET, a product developed by Digiwin, is affected by a critical SQL Injection vulnerability (CVE-2026-5964). This flaw allows unauthenticated remote attackers to inject arbitrary SQL commands into the application&rsquo;s database queries. This can lead to the unauthorized reading, modification, or deletion of sensitive database contents. The vulnerability poses a significant risk, as it requires no prior authentication and can be exploited remotely. Public reports detailing the vulnerability were released in April 2026, and exploitation attempts are anticipated to increase. Defenders should prioritize patching and implementing detection mechanisms to mitigate potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies an EasyFlow .NET instance exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request containing SQL injection payloads within a vulnerable parameter.</li>
<li>The EasyFlow .NET application fails to properly sanitize the input, passing the malicious SQL query to the database.</li>
<li>The database executes the injected SQL command, potentially revealing sensitive data.</li>
<li>The attacker extracts data from the database, such as user credentials or proprietary information.</li>
<li>The attacker leverages the SQL injection to modify database records, such as escalating privileges or injecting malicious code.</li>
<li>The attacker may delete data from the database, leading to denial of service or data loss.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL Injection vulnerability allows unauthenticated attackers to read, modify, and delete data within the EasyFlow .NET database. This can lead to the compromise of sensitive information, including user credentials, financial data, and proprietary business information. Modified data can disrupt business operations or facilitate further attacks. Data deletion can cause significant data loss and system instability. Due to the critical nature of the vulnerability and the ease of exploitation, organizations using EasyFlow .NET are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to the latest version of EasyFlow .NET provided by Digiwin to remediate CVE-2026-5964.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Attempts in HTTP Requests&rdquo; to identify exploitation attempts targeting web servers.</li>
<li>Implement input validation and parameterized queries to prevent SQL injection vulnerabilities in web applications.</li>
<li>Monitor web server logs for suspicious HTTP requests containing common SQL injection keywords.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>vulnerability</category><category>web-application</category></item><item><title>Digiwin EasyFlow .NET SQL Injection Vulnerability (CVE-2026-5963)</title><link>https://feed.craftedsignal.io/briefs/2026-04-digiwin-easyflow-sqli/</link><pubDate>Mon, 20 Apr 2026 08:16:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-digiwin-easyflow-sqli/</guid><description>Digiwin EasyFlow .NET is vulnerable to SQL Injection, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.</description><content:encoded><![CDATA[<p>Digiwin EasyFlow .NET is susceptible to a critical SQL Injection vulnerability (CVE-2026-5963). This flaw allows unauthenticated remote attackers to inject arbitrary SQL commands directly into the application&rsquo;s database queries. The vulnerability allows attackers to read, modify, or delete sensitive data within the EasyFlow .NET database, potentially leading to complete compromise of the application and its underlying data. Given the nature of SQL injection, this vulnerability could be exploited by attackers with minimal technical knowledge, making it a significant threat to organizations using EasyFlow .NET. The vulnerability was disclosed on April 20, 2026, and immediate patching or mitigation is strongly advised.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable EasyFlow .NET endpoint exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request containing a SQL injection payload within a parameter expected by the endpoint.</li>
<li>The EasyFlow .NET application fails to properly sanitize or validate the input, passing the malicious SQL query to the database.</li>
<li>The database executes the attacker-controlled SQL query.</li>
<li>The attacker extracts sensitive data from the database by using <code>UNION SELECT</code> statements, potentially revealing usernames, passwords, or confidential business information.</li>
<li>Alternatively, the attacker modifies data within the database using <code>UPDATE</code> statements, potentially altering application configuration or user privileges.</li>
<li>The attacker deletes data from the database using <code>DELETE</code> statements, potentially causing denial-of-service or data loss.</li>
<li>The attacker achieves complete control over the EasyFlow .NET application and its data, potentially using this access to pivot to other internal systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to read, modify, or delete arbitrary data within the EasyFlow .NET database. This can lead to the exposure of sensitive customer information, financial data, or intellectual property. Attackers could also modify application configurations, escalate privileges, or cause a complete denial of service. Given the critical nature of business process management applications like EasyFlow, a successful attack could result in significant financial losses, reputational damage, and regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch or update provided by Digiwin to address CVE-2026-5963.</li>
<li>Implement strong input validation and sanitization techniques on all user-supplied data within EasyFlow .NET to prevent SQL injection attacks, referencing CWE-89.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Attempts in Web Logs&rdquo; to monitor for exploitation attempts against EasyFlow .NET web server logs.</li>
<li>Monitor network traffic for suspicious database activity originating from EasyFlow .NET servers.</li>
<li>Review and restrict database user privileges to follow the principle of least privilege.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-5963</category><category>easyflow</category><category>digiwin</category></item><item><title>WeGIA SQL Injection Vulnerability (CVE-2026-40285)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wegia-sqli/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wegia-sqli/</guid><description>WeGIA versions prior to 3.6.10 are vulnerable to SQL injection via the cpf_usuario POST parameter, allowing authenticated users to query the database under an arbitrary identity.</description><content:encoded><![CDATA[<p>WeGIA, a web manager for charitable institutions, is susceptible to a SQL injection vulnerability affecting versions prior to 3.6.10. This flaw, identified as CVE-2026-40285, resides in the <code>dao/memorando/UsuarioDAO.php</code> file. The vulnerability stems from the insecure handling of the <code>cpf_usuario</code> POST parameter within the <code>DespachoControle::verificarDespacho()</code> function, where the <code>extract($_REQUEST)</code> function overwrites the session-stored user identity. An attacker can then manipulate the <code>cpf_usuario</code> value, which is subsequently interpolated directly into a raw SQL query. This allows an authenticated user to execute arbitrary SQL queries with the privileges of an arbitrary user, potentially gaining unauthorized access to sensitive data. WeGIA version 3.6.10 addresses and resolves this critical vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WeGIA web application.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the endpoint associated with <code>DespachoControle::verificarDespacho()</code>.</li>
<li>The crafted POST request includes the <code>cpf_usuario</code> parameter with a SQL injection payload.</li>
<li>The <code>extract($_REQUEST)</code> function processes the POST data, overwriting the legitimate session-stored user identity with the attacker-controlled <code>cpf_usuario</code> value.</li>
<li>The application constructs a raw SQL query, directly interpolating the malicious <code>cpf_usuario</code> value into the query string without proper sanitization.</li>
<li>The database executes the crafted SQL query, effectively querying the database as an arbitrary user specified by the attacker in the <code>cpf_usuario</code> parameter.</li>
<li>The application returns the results of the injected SQL query to the attacker, potentially revealing sensitive information.</li>
<li>The attacker can leverage the SQL injection to perform unauthorized data retrieval, modification, or deletion within the WeGIA application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-40285) allows attackers to bypass authentication and access sensitive data within the WeGIA application. This could lead to the compromise of user accounts, financial records, or other confidential information managed by charitable institutions using WeGIA. The impact could range from data breaches and financial losses to reputational damage and legal repercussions for the affected organizations. The CVSS v3.1 base score of 8.8 indicates a high level of severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade WeGIA installations to version 3.6.10 or later to remediate CVE-2026-40285.</li>
<li>Deploy the following Sigma rule to detect exploitation attempts by monitoring for POST requests containing potentially malicious SQL injection payloads in the <code>cpf_usuario</code> parameter.</li>
<li>Implement input validation and sanitization measures for all user-supplied data, especially within the <code>DespachoControle::verificarDespacho()</code> function to prevent future SQL injection vulnerabilities.</li>
<li>Review web server logs for suspicious POST requests targeting WeGIA endpoints to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wegia</category><category>sql-injection</category><category>cve-2026-40285</category><category>web-application</category></item><item><title>PraisonAI Multiple Backends Vulnerable to SQL Injection via Unvalidated Table Prefix</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-sqli/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-sqli/</guid><description>PraisonAI is vulnerable to SQL injection across nine database backends due to unsanitized `table_prefix` parameters, and in PostgreSQL due to an unsanitized `schema` parameter, enabling arbitrary SQL execution.</description><content:encoded><![CDATA[<p>PraisonAI, a software application, contains a critical SQL injection vulnerability affecting nine of its conversation store backends, including MySQL, PostgreSQL, and others. The vulnerability stems from the improper handling of the <code>table_prefix</code> parameter, which is passed directly into SQL queries without adequate validation. Specifically, backends such as MySQL, PostgreSQL, async SQLite/MySQL/PostgreSQL, Turso, SingleStore, Supabase, and SurrealDB are affected. In addition, the PostgreSQL backend is vulnerable due to the unvalidated <code>schema</code> parameter. This flaw allows an attacker to inject arbitrary SQL commands, potentially gaining unauthorized access to sensitive data. The incomplete fix for CVE-2026-40315 only addressed the SQLite backend, leaving other backends exposed. This vulnerability exists in PraisonAI versions 4.5.148 and earlier, as well as PraisonAI Agents versions 1.6.7 and earlier.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a PraisonAI instance where the <code>table_prefix</code> or <code>schema</code> (PostgreSQL) parameter is derived from external input (e.g., API request, user-modifiable configuration).</li>
<li>The attacker crafts a malicious <code>table_prefix</code> or <code>schema</code> string containing SQL injection payload (e.g., &ldquo;x&rsquo;; DROP TABLE users; &ndash;&rdquo;).</li>
<li>The attacker injects the malicious <code>table_prefix</code> or <code>schema</code> via the vulnerable input vector.</li>
<li>The PraisonAI application receives the crafted <code>table_prefix</code> or <code>schema</code> and incorporates it into a dynamically generated SQL query without proper sanitization.</li>
<li>The application executes the malicious SQL query against the database.</li>
<li>The attacker&rsquo;s injected SQL commands are executed, potentially allowing them to read, modify, or delete data within the database.</li>
<li>The attacker gains unauthorized access to sensitive data, such as user credentials, financial information, or other confidential data.</li>
<li>The attacker may escalate privileges, compromise other systems, or perform further malicious activities within the affected environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability enables attackers to execute arbitrary SQL commands, potentially leading to complete database compromise. The attacker can read sensitive data, modify existing records, inject malicious code, or even drop entire tables. This can result in significant data loss, financial damage, and reputational harm for affected organizations. This vulnerability is exploitable in any deployment where the <code>table_prefix</code> is derived from external input, such as in multi-tenant setups or API-driven configurations. The PostgreSQL <code>schema</code> parameter provides an additional injection point, further expanding the attack surface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>table_prefix</code> parameter in all database backends, mirroring the fix implemented for <code>sqlite.py</code> as described in the overview.</li>
<li>Apply input validation and sanitization to the <code>schema</code> parameter in the PostgreSQL backend, as noted in the overview.</li>
<li>Deploy the Sigma rule <code>Detect Malicious Table Prefix</code> to detect attempts to exploit this vulnerability in MySQL and PostgreSQL backends, as detailed below.</li>
<li>Upgrade PraisonAI to a version that includes proper input validation for <code>table_prefix</code> and <code>schema</code> parameters, targeting versions later than 4.5.148 for PraisonAI and later than 1.6.7 for PraisonAI Agents.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>praisonai</category><category>web-application</category></item><item><title>YesWiki Authenticated SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-24-yeswiki-sqli/</link><pubDate>Sat, 18 Apr 2026 01:00:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-24-yeswiki-sqli/</guid><description>YesWiki is vulnerable to authenticated SQL Injection via the id_fiche parameter in the EntryManager::formatDataBeforeSave() function, allowing attackers to inject arbitrary SQL commands and potentially extract sensitive data.</description><content:encoded><![CDATA[<p>YesWiki versions 4.6.0 and earlier are vulnerable to SQL injection in the bazar module. This vulnerability exists in <code>tools/bazar/services/EntryManager.php</code> within the <code>formatDataBeforeSave()</code> function. The <code>$data['id_fiche']</code> value, derived from the <code>$_POST['id_fiche']</code> parameter, is directly concatenated into a raw SQL query without proper sanitization. An authenticated attacker can exploit this by sending a crafted POST request to the <code>/api/entries/{formId}</code> endpoint. Successful exploitation enables time-based blind SQL injection, potentially leading to complete database compromise. The vulnerability was confirmed using a Docker PoC demonstrating the ability to induce a time delay using the SLEEP() function within the injected SQL.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the YesWiki application as any user. This requires a valid <code>wikini_session</code> cookie.</li>
<li>Attacker crafts a POST request to <code>/api/entries/{formId}</code>, where <code>{formId}</code> is the ID of an existing bazar form.</li>
<li>The POST request includes the <code>id_fiche</code> parameter with a malicious SQL payload, such as <code>' OR SLEEP(3) OR '</code>.</li>
<li><code>ApiController::createEntry()</code> processes the request and calls <code>isEntry($_POST['id_fiche'])</code>.</li>
<li>Since the injected SQL will likely not correspond to an existing entry, the <code>create()</code> method is invoked.</li>
<li>The <code>create()</code> method calls <code>formatDataBeforeSave()</code>, which contains the SQL injection vulnerability at line 704 in <code>EntryManager.php</code>.</li>
<li>The injected SQL payload is executed by the database server via <code>dbService-&gt;loadSingle()</code>, without proper escaping or parameterization.</li>
<li>If successful, the attacker can extract sensitive information from the database, such as usernames, passwords, and other confidential data. They can also modify data within the database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to the complete compromise of the YesWiki database. This includes the potential to access and exfiltrate sensitive data, such as user credentials, configuration details, and business-critical information. Attackers can also modify or delete data, leading to data integrity issues and service disruption. Since any authenticated user can trigger the vulnerability, the impact is widespread. The vulnerability affects composer/yeswiki/yeswiki versions 4.6.0 and earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the provided patch in <code>tools/bazar/services/EntryManager.php</code> by escaping the <code>$data['id_fiche']</code> value before using it in the SQL query (see Proposed Fix in Content section).</li>
<li>Deploy the Sigma rule &ldquo;Detect YesWiki SQL Injection Attempt via API Entries&rdquo; to detect attempts to exploit this vulnerability via suspicious <code>id_fiche</code> POST data.</li>
<li>Monitor web server logs for POST requests to <code>/api/entries/*</code> with unusually long or complex <code>id_fiche</code> parameters, as this could indicate a SQL injection attempt.</li>
<li>Review and audit all database queries within the YesWiki application to identify and remediate any other potential SQL injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>yeswiki</category><category>sql-injection</category><category>web-application</category></item><item><title>WC Lovers WCFM Marketplace SQL Injection Vulnerability (CVE-2025-63029)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wcfm-sql-injection/</link><pubDate>Wed, 15 Apr 2026 17:17:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wcfm-sql-injection/</guid><description>An SQL Injection vulnerability, identified as CVE-2025-63029, exists in the WC Lovers WCFM Marketplace WordPress plugin up to version 3.7.1, potentially allowing attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>CVE-2025-63029 describes an SQL Injection vulnerability affecting the WC Lovers WCFM (WooCommerce Frontend Manager) Marketplace WordPress plugin. This vulnerability, present in versions up to and including 3.7.1, stems from improper neutralization of special elements within SQL commands. An attacker exploiting this flaw can inject malicious SQL code, potentially leading to unauthorized data access, modification, or deletion within the WordPress database. Given the widespread use of WordPress and the WCFM Marketplace plugin, this vulnerability poses a significant risk to e-commerce websites and their associated sensitive information. Successful exploitation could result in compromised customer data, financial losses, and reputational damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable WCFM Marketplace instance running a version &lt;= 3.7.1.</li>
<li>The attacker crafts a malicious HTTP request containing SQL injection payloads in a vulnerable parameter.</li>
<li>The WCFM Marketplace plugin fails to properly sanitize the attacker-controlled input.</li>
<li>The unsanitized input is incorporated into an SQL query executed against the WordPress database.</li>
<li>The injected SQL code modifies the intended query logic.</li>
<li>The database server executes the attacker&rsquo;s malicious SQL query.</li>
<li>The attacker gains unauthorized access to sensitive data stored in the database, such as user credentials, financial information, or product details.</li>
<li>The attacker may modify or delete data, escalate privileges, or potentially gain control of the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-63029 can have severe consequences. An attacker could gain complete control over the affected WordPress site&rsquo;s database. This can lead to the theft of sensitive customer data (e.g., usernames, passwords, addresses, payment information), modification of product listings and pricing, or even complete site defacement or takeover. The number of potentially affected sites is substantial, considering the popularity of the WCFM Marketplace plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WC Lovers WCFM Marketplace plugin to the latest available version, which includes a patch for CVE-2025-63029.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious WCFM Marketplace SQL Injection Attempts&rdquo; to your SIEM to identify potential exploitation attempts targeting this vulnerability.</li>
<li>Monitor web server logs for suspicious HTTP requests containing potential SQL injection payloads targeting the WCFM Marketplace plugin.</li>
<li>Review and harden database access controls to minimize the impact of potential SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>wcfm-marketplace</category></item><item><title>Krayin CRM v2.2.x SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-krayin-sqli/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-krayin-sqli/</guid><description>Krayin CRM v2.2.x is vulnerable to SQL injection via the rotten_lead parameter in /Lead/LeadDataGrid.php, potentially allowing attackers to read sensitive data.</description><content:encoded><![CDATA[<p>Krayin CRM v2.2.x is susceptible to a SQL injection vulnerability identified as CVE-2026-38528. The vulnerability resides in the <code>/Lead/LeadDataGrid.php</code> script, specifically within the <code>rotten_lead</code> parameter. An attacker could exploit this vulnerability by injecting malicious SQL queries, potentially gaining unauthorized access to sensitive information stored within the CRM database. The CVSS v3.1 score is 7.1, indicating a high severity level. Successful exploitation requires a low level of privileges. This vulnerability was reported in April 2026 and could impact organizations using the affected Krayin CRM version, leading to data breaches and potential compromise of customer information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Krayin CRM v2.2.x instance.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/Lead/LeadDataGrid.php</code>.</li>
<li>The HTTP request includes a SQL injection payload within the <code>rotten_lead</code> parameter.</li>
<li>The Krayin CRM application processes the request without proper sanitization of the <code>rotten_lead</code> parameter.</li>
<li>The injected SQL query is executed against the CRM database.</li>
<li>The attacker retrieves sensitive data from the database, such as customer details, user credentials, or financial information.</li>
<li>The attacker may use the compromised data for further malicious activities, such as identity theft or financial fraud.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to the unauthorized disclosure of sensitive customer data, financial records, and internal CRM data. This could result in significant financial losses, reputational damage, and legal repercussions for affected organizations. While the exact number of potential victims is unknown, any organization using Krayin CRM v2.2.x is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates from the vendor to address CVE-2026-38528.</li>
<li>Implement input validation and sanitization on the <code>rotten_lead</code> parameter within <code>/Lead/LeadDataGrid.php</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Krayin CRM SQL Injection Attempt&rdquo; to your SIEM and tune for your environment.</li>
<li>Monitor web server logs for suspicious requests targeting <code>/Lead/LeadDataGrid.php</code> with potentially malicious SQL syntax.</li>
<li>Implement strong database access controls to limit the impact of successful SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-38528</category><category>krayin-crm</category></item><item><title>SQL Injection Vulnerability in anirudhkannan Grocery Store Management System 1.0 (CVE-2025-63939)</title><link>https://feed.craftedsignal.io/briefs/2026-04-grocery-store-sqli/</link><pubDate>Tue, 14 Apr 2026 16:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-grocery-store-sqli/</guid><description>A critical SQL injection vulnerability (CVE-2025-63939) exists in the anirudhkannan Grocery Store Management System 1.0, allowing unauthenticated attackers to execute arbitrary SQL queries via the sitem_name POST parameter in /Grocery/search_products_itname.php.</description><content:encoded><![CDATA[<p>CVE-2025-63939 is a SQL injection vulnerability found in anirudhkannan Grocery Store Management System version 1.0. The vulnerability resides in the <code>/Grocery/search_products_itname.php</code> script, specifically related to improper input handling of the <code>sitem_name</code> POST parameter. An unauthenticated attacker can exploit this vulnerability by injecting malicious SQL code into the <code>sitem_name</code> parameter, potentially leading to unauthorized access to the database, data exfiltration, modification, or even complete system compromise. The vulnerable software is a web application typically deployed on web servers, potentially exposing a wide range of grocery stores and related businesses to this critical flaw. This vulnerability was published on 2026-04-14.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an instance of anirudhkannan Grocery Store Management System 1.0 running on a web server.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/Grocery/search_products_itname.php</code> endpoint.</li>
<li>The crafted POST request includes the <code>sitem_name</code> parameter, containing SQL injection payload.</li>
<li>The web server receives the malicious request and passes the <code>sitem_name</code> value to the vulnerable SQL query without proper sanitization or escaping.</li>
<li>The injected SQL code is executed by the database server, allowing the attacker to manipulate the database.</li>
<li>The attacker uses SQL injection techniques (e.g., <code>UNION SELECT</code>, <code>SLEEP()</code>) to extract sensitive data, such as user credentials, product information, or financial records.</li>
<li>Depending on database privileges, the attacker could modify existing data (e.g., changing product prices, altering inventory levels) or insert new data (e.g., creating rogue administrator accounts).</li>
<li>The attacker achieves complete control over the database, potentially leading to full system compromise, data exfiltration, or denial-of-service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-63939 can have severe consequences. An attacker could gain unauthorized access to sensitive customer data, including personal information, payment details, and order history. This can lead to financial losses, reputational damage, and legal liabilities for the affected grocery store. The attacker could also manipulate product information, alter pricing, or disrupt business operations. In a worst-case scenario, the attacker could gain complete control of the database server, leading to full system compromise and significant financial and operational losses. Given the widespread use of vulnerable versions, a large number of grocery stores using this software are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary patches or updates provided by the vendor to address CVE-2025-63939. If a patch is unavailable, consider implementing a web application firewall (WAF) rule to filter out malicious SQL injection attempts targeting the <code>/Grocery/search_products_itname.php</code> endpoint.</li>
<li>Deploy the Sigma rule <code>Detecting SQL Injection Attempts via sitem_name Parameter</code> to your SIEM to identify potential exploitation attempts.</li>
<li>Review and harden database access controls to limit the impact of successful SQL injection attacks.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/Grocery/search_products_itname.php</code> containing potentially malicious SQL syntax, as detected by <code>Detecting SQL Injection Attempts via sitem_name Parameter</code>.</li>
<li>Inspect traffic for connections to the URL <code>https://github.com/TREXNEGRO/Security-Advisories/tree/main/CVE-2025-63939</code> to identify potential reconnaissance activity.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2025-63939</category></item><item><title>SAP Business Planning and Consolidation and Business Warehouse SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-sap-sql-injection/</link><pubDate>Tue, 14 Apr 2026 00:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sap-sql-injection/</guid><description>CVE-2026-27681 describes an insufficient authorization check vulnerability in SAP Business Planning and Consolidation and SAP Business Warehouse that allows authenticated users to execute crafted SQL statements, leading to unauthorized data access, modification, and deletion.</description><content:encoded><![CDATA[<p>CVE-2026-27681 highlights a critical security flaw within SAP Business Planning and Consolidation and SAP Business Warehouse. This vulnerability stems from insufficient authorization checks, which allows an authenticated user to inject and execute arbitrary SQL commands. The vulnerability was published on 2026-04-13. An attacker can leverage this flaw to perform unauthorized actions such as reading sensitive data, modifying critical system configurations, and deleting essential information. The successful exploitation of CVE-2026-27681 can lead to significant disruption of business operations, data breaches, and potential financial losses. The scope of impact is broad, affecting organizations relying on these SAP solutions for their planning, consolidation, and data warehousing needs. Defenders should prioritize patching and mitigating this vulnerability to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for SAP Business Planning and Consolidation or SAP Business Warehouse.</li>
<li>The attacker identifies input fields or interfaces within the SAP application that are vulnerable to SQL injection.</li>
<li>The attacker crafts malicious SQL statements designed to bypass authorization checks.</li>
<li>The attacker injects the crafted SQL statements into the vulnerable input fields or interfaces.</li>
<li>The SAP application executes the attacker-supplied SQL statements against the underlying database.</li>
<li>The attacker reads sensitive data from database tables, including user credentials, financial records, or proprietary information.</li>
<li>The attacker modifies existing data within the database to manipulate system configurations, grant elevated privileges, or disrupt business processes.</li>
<li>The attacker deletes critical database records, causing data loss, system instability, and denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-27681 can have severe consequences for affected organizations. The ability to read, modify, and delete database data can lead to data breaches, financial fraud, and disruption of critical business processes. The vulnerability allows attackers to gain unauthorized access to sensitive information, manipulate system configurations, and cause data loss. This can result in significant financial losses, reputational damage, and regulatory penalties. Organizations relying on SAP Business Planning and Consolidation and SAP Business Warehouse should prioritize patching this vulnerability to prevent potential exploitation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by SAP SE as described in SAP Note 3719353 to remediate CVE-2026-27681 immediately.</li>
<li>Monitor SAP application logs for suspicious SQL queries or unauthorized database access attempts to detect potential exploitation of CVE-2026-27681.</li>
<li>Implement strong input validation and sanitization measures to prevent SQL injection attacks in SAP Business Planning and Consolidation and SAP Business Warehouse.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SAP SQL Injection Attempts&rdquo; to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-27681</category><category>sql-injection</category><category>sap</category></item><item><title>SQL Injection Vulnerability in Faculty Management System</title><link>https://feed.craftedsignal.io/briefs/2026-04-faculty-mgmt-sqli/</link><pubDate>Mon, 13 Apr 2026 07:16:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-faculty-mgmt-sqli/</guid><description>A remote attacker can exploit an SQL injection vulnerability (CVE-2026-6167) in the code-projects Faculty Management System 1.0 by manipulating the ID argument in the /subject-print.php file, potentially leading to data exfiltration or modification.</description><content:encoded><![CDATA[<p>The code-projects Faculty Management System 1.0 is vulnerable to SQL injection (CVE-2026-6167) within the <code>/subject-print.php</code> file. The vulnerability stems from improper sanitization of the <code>ID</code> argument, allowing a remote attacker to inject arbitrary SQL commands. This exploit has been publicly disclosed, increasing the risk of widespread exploitation. Given the sensitive nature of data managed by faculty management systems, successful exploitation could lead to significant data breaches, system compromise, and disruption of academic operations. The lack of required authentication to trigger the vulnerability makes it particularly dangerous.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of code-projects Faculty Management System 1.0 accessible over the internet.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/subject-print.php</code> endpoint.</li>
<li>The malicious request includes a modified <code>ID</code> parameter containing SQL injection payloads. For example, <code>ID=1' OR '1'='1</code>.</li>
<li>The web server processes the request and passes the unsanitized <code>ID</code> parameter to the underlying SQL database.</li>
<li>The injected SQL code is executed by the database, potentially allowing the attacker to bypass authentication or access unauthorized data.</li>
<li>The attacker leverages the SQL injection to extract sensitive data from the database, such as usernames, passwords, student records, or financial information.</li>
<li>The attacker may use the extracted credentials to gain administrative access to the application.</li>
<li>Finally, the attacker could modify or delete data within the database, exfiltrate data, or pivot to other systems within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-6167) in code-projects Faculty Management System 1.0 can lead to severe consequences. An attacker could potentially access and exfiltrate sensitive student and faculty data, modify grades, compromise user accounts, and disrupt academic operations. The public availability of the exploit increases the likelihood of widespread attacks targeting vulnerable systems, potentially impacting numerous educational institutions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious HTTP requests targeting <code>/subject-print.php</code> with unusual characters or SQL keywords in the <code>ID</code> parameter to detect potential exploitation attempts. Use the provided Sigma rule to facilitate this.</li>
<li>Implement a web application firewall (WAF) rule to block requests containing SQL injection payloads targeting <code>/subject-print.php</code>.</li>
<li>Apply input validation and sanitization to the <code>ID</code> parameter in <code>/subject-print.php</code> to prevent SQL injection, effectively patching CVE-2026-6167.</li>
<li>Monitor database logs for unusual queries originating from the web application server that could indicate successful SQL injection.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>SQL Injection Vulnerability in Lost and Found Thing Management 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-04-lost-found-sql-injection/</link><pubDate>Mon, 13 Apr 2026 06:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-lost-found-sql-injection/</guid><description>A remote SQL injection vulnerability (CVE-2026-6163) exists in code-projects Lost and Found Thing Management 1.0 via manipulation of the 'cat' parameter in /catageory.php, potentially allowing attackers to read, modify, or delete database information.</description><content:encoded><![CDATA[<p>A critical SQL injection vulnerability has been identified in code-projects Lost and Found Thing Management version 1.0, tracked as CVE-2026-6163. This vulnerability resides within the <code>/catageory.php</code> file and can be exploited by remotely manipulating the <code>cat</code> parameter. Due to the application&rsquo;s failure to properly sanitize user-supplied input, an attacker can inject arbitrary SQL code, potentially leading to unauthorized data access, modification, or deletion. The existence of a publicly available exploit increases the risk of widespread exploitation. Organizations using this software should take immediate action to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of Lost and Found Thing Management 1.0.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/catageory.php</code> endpoint.</li>
<li>The crafted request includes a SQL injection payload within the <code>cat</code> parameter.</li>
<li>The web server receives the request and passes the unsanitized <code>cat</code> parameter to the application&rsquo;s database query.</li>
<li>The injected SQL code is executed within the database context.</li>
<li>Depending on the injected code, the attacker can read sensitive data, modify existing records, or delete information from the database.</li>
<li>The database server processes the malicious SQL query and returns the output.</li>
<li>The application returns the modified output to the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-6163) could allow a remote attacker to compromise the affected Lost and Found Thing Management 1.0 application. This may lead to unauthorized access to sensitive information stored within the database, such as user credentials, personal details of individuals who have lost or found items, and information about the items themselves. The attacker can potentially modify or delete records, leading to data corruption or denial of service. Due to the availability of a public exploit, the potential impact is significant for any organization running this vulnerable software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates provided by the vendor (code-projects.org) to remediate the SQL injection vulnerability in <code>/catageory.php</code> as soon as they become available.</li>
<li>Implement input validation and sanitization on all user-supplied data, particularly the <code>cat</code> parameter in <code>/catageory.php</code>, to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Attempts via URI&rdquo; to detect potential exploitation attempts against the <code>/catageory.php</code> endpoint.</li>
<li>Review and restrict database user privileges to follow the principle of least privilege, limiting the impact of successful SQL injection attacks.</li>
<li>Monitor web server logs for suspicious activity related to the <code>/catageory.php</code> endpoint, such as unusual characters or SQL keywords in the <code>cat</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>Simple ChatBox Unauthenticated SQL Injection Vulnerability (CVE-2026-6161)</title><link>https://feed.craftedsignal.io/briefs/2026-04-simple-chatbox-sql-injection/</link><pubDate>Mon, 13 Apr 2026 05:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-simple-chatbox-sql-injection/</guid><description>CVE-2026-6161 is an unauthenticated SQL injection vulnerability in the Simple ChatBox application (&lt;= 1.0) that can be exploited by sending a crafted HTTP request to `/chatbox/insert.php`.</description><content:encoded><![CDATA[<p>A critical SQL injection vulnerability, identified as CVE-2026-6161, has been discovered in Simple ChatBox version 1.0 and earlier. This flaw resides in the <code>/chatbox/insert.php</code> file, which is responsible for handling chat message insertion. A remote attacker can exploit this vulnerability by injecting malicious SQL code into the <code>msg</code> parameter of an HTTP request, without needing authentication. The attacker&rsquo;s malicious SQL commands are then executed against the application database. The exploit is publicly available, increasing the risk of widespread exploitation. Successful exploitation could lead to unauthorized data access, modification, or even complete database takeover. Due to the ease of exploitation and potential impact, this vulnerability poses a significant threat to systems running vulnerable versions of Simple ChatBox.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Simple ChatBox installation running version 1.0 or earlier.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/chatbox/insert.php</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>msg</code> parameter of the POST request. This code could be designed to extract data, modify existing data, or insert new data into the database.</li>
<li>The web server receives the malicious HTTP request and passes the <code>msg</code> parameter to the vulnerable PHP script.</li>
<li>The <code>/chatbox/insert.php</code> script fails to properly sanitize the <code>msg</code> parameter before using it in an SQL query.</li>
<li>The injected SQL code is executed against the Simple ChatBox database, granting the attacker unauthorized access.</li>
<li>The attacker may use this access to read sensitive data, such as user credentials or private messages.</li>
<li>The attacker could also modify data to deface the chatbox or inject malicious content.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6161 can lead to a range of severe consequences. An attacker can gain unauthorized access to the Simple ChatBox database, potentially compromising sensitive information such as user credentials, private messages, and other application data. This can result in data breaches, identity theft, and reputational damage. Furthermore, the attacker could modify or delete data, leading to data loss or service disruption. In the worst-case scenario, the attacker could gain complete control over the database server, potentially compromising other applications or systems hosted on the same server. Due to the public availability of the exploit, unpatched Simple ChatBox installations are at significant risk of being targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization techniques to the <code>msg</code> parameter within the <code>/chatbox/insert.php</code> file to prevent SQL injection (reference: CVE-2026-6161).</li>
<li>Deploy the provided Sigma rule to detect suspicious HTTP requests targeting <code>/chatbox/insert.php</code> with potentially malicious SQL payloads (reference: the Sigma rule &ldquo;Detect Simple Chatbox SQL Injection Attempt&rdquo;).</li>
<li>Implement database access controls to limit the privileges of the Simple ChatBox application to the minimum required for its operation, mitigating potential damage from successful SQL injection (reference: CVE-2026-6161).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-6161</category></item><item><title>MyT-PM 1.5.1 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-mytpm-sqli/</link><pubDate>Sun, 12 Apr 2026 13:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mytpm-sqli/</guid><description>MyT-PM 1.5.1 is vulnerable to SQL injection, allowing authenticated attackers to execute arbitrary SQL queries via the Charge[group_total] parameter.</description><content:encoded><![CDATA[<p>MyT-PM 1.5.1 is susceptible to an SQL injection vulnerability (CVE-2019-25713) that enables authenticated attackers to execute arbitrary SQL queries. This vulnerability exists due to insufficient input sanitization of the <code>Charge[group_total]</code> parameter. By sending specially crafted POST requests to the <code>/charge/admin</code> endpoint, an attacker can inject malicious SQL code, potentially leading to sensitive data extraction, data manipulation, or other unauthorized actions. This vulnerability poses a significant risk to organizations using MyT-PM 1.5.1 as it could compromise the integrity and confidentiality of their data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the MyT-PM 1.5.1 application.</li>
<li>The attacker crafts a malicious POST request targeting the <code>/charge/admin</code> endpoint.</li>
<li>Within the POST request, the attacker injects SQL code into the <code>Charge[group_total]</code> parameter.</li>
<li>The application processes the request without properly sanitizing the <code>Charge[group_total]</code> parameter.</li>
<li>The injected SQL code is executed against the underlying database.</li>
<li>The attacker leverages the SQL injection to extract sensitive data (e.g., user credentials, financial information) using error-based, time-based blind, or stacked query payloads.</li>
<li>The attacker may further manipulate data within the database, potentially altering records or creating new entries.</li>
<li>The attacker achieves complete control over the database, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to the unauthorized disclosure of sensitive information, such as user credentials, financial records, and other confidential data stored within the MyT-PM database. Attackers may also be able to modify or delete data, leading to data integrity issues and potential disruption of business operations. This could result in financial losses, reputational damage, and legal repercussions for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patches or upgrade to a secure version of MyT-PM that addresses CVE-2019-25713.</li>
<li>Deploy the provided Sigma rule to detect potentially malicious requests containing SQL injection attempts targeting the <code>/charge/admin</code> endpoint and the <code>Charge[group_total]</code> parameter.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection vulnerabilities in MyT-PM and other web applications.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/charge/admin</code> with unusual characters or SQL keywords in the <code>Charge[group_total]</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2019-25713</category></item><item><title>eBrigade ERP 4.5 SQL Injection Vulnerability (CVE-2019-25707)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ebrigade-sql-injection/</link><pubDate>Sun, 12 Apr 2026 13:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ebrigade-sql-injection/</guid><description>eBrigade ERP 4.5 is vulnerable to SQL injection via the 'id' parameter in pdf.php, allowing authenticated attackers to execute arbitrary SQL queries and extract sensitive database information.</description><content:encoded><![CDATA[<p>eBrigade ERP 4.5 is susceptible to an SQL injection vulnerability (CVE-2019-25707) that enables authenticated attackers to execute arbitrary SQL queries. The vulnerability is located in the pdf.php script and is triggered via the &lsquo;id&rsquo; parameter. By injecting malicious SQL code into this parameter through a GET request, an attacker can potentially extract sensitive information from the database, including table names and schema details. This vulnerability poses a significant risk to organizations using eBrigade ERP 4.5, as successful exploitation could lead to data breaches, compromised credentials, and other malicious activities. The vulnerability was published on 2026-04-12.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for eBrigade ERP 4.5 either through credential stuffing or some other credential compromise technique.</li>
<li>The attacker crafts a malicious SQL payload designed to extract sensitive information or manipulate the database.</li>
<li>The attacker constructs a GET request targeting the pdf.php endpoint, embedding the malicious SQL payload within the &lsquo;id&rsquo; parameter (e.g., <code>pdf.php?id=1' UNION SELECT ...</code>).</li>
<li>The server-side application fails to properly sanitize or validate the &lsquo;id&rsquo; parameter before incorporating it into an SQL query.</li>
<li>The application executes the attacker-controlled SQL query against the database.</li>
<li>The database returns the results of the injected SQL query to the application.</li>
<li>The application displays the extracted data to the attacker.</li>
<li>The attacker uses the extracted data (database schema, usernames, passwords, etc.) to further compromise the application or gain unauthorized access to other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2019-25707) can lead to the extraction of sensitive information from the eBrigade ERP 4.5 database. This could include customer data, financial records, employee information, and other confidential data. The impact could range from data breaches and financial losses to reputational damage and legal repercussions. While the exact number of victims is unknown, any organization using eBrigade ERP 4.5 is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server access logs for suspicious GET requests to <code>pdf.php</code> containing SQL syntax in the <code>id</code> parameter to detect exploitation attempts using the provided Sigma rule.</li>
<li>Apply input validation and sanitization to the &lsquo;id&rsquo; parameter in <code>pdf.php</code> to prevent SQL injection attacks.</li>
<li>Upgrade to a patched version of eBrigade ERP or apply the necessary security patches provided by the vendor to remediate CVE-2019-25707.</li>
<li>Monitor network traffic for unusual database activity originating from the eBrigade ERP 4.5 server.</li>
<li>Block access to the known exploit URL (<code>https://www.exploit-db.com/exploits/46117</code>) at your web proxy or firewall.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2019-25707</category></item><item><title>Vehicle Showroom Management System SQL Injection Vulnerability (CVE-2026-6038)</title><link>https://feed.craftedsignal.io/briefs/2026-04-vehicle-showroom-sql-injection/</link><pubDate>Fri, 10 Apr 2026 09:20:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vehicle-showroom-sql-injection/</guid><description>A remote SQL injection vulnerability (CVE-2026-6038) exists in the code-projects Vehicle Showroom Management System 1.0, specifically affecting the /util/RegisterCustomerFunction.php file by manipulating the BRANCH_ID argument.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-6038, has been discovered in version 1.0 of the code-projects Vehicle Showroom Management System. This vulnerability resides within the <code>/util/RegisterCustomerFunction.php</code> file, and can be exploited by manipulating the <code>BRANCH_ID</code> argument. The vulnerability allows for remote exploitation, meaning an attacker does not need local access to the system. Publicly available exploit code exists, increasing the likelihood of exploitation. Successful exploitation could allow an attacker to read, modify, or delete sensitive data within the application&rsquo;s database. This vulnerability was published on 2026-04-10.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of Vehicle Showroom Management System 1.0.</li>
<li>Attacker crafts a malicious HTTP request targeting <code>/util/RegisterCustomerFunction.php</code>.</li>
<li>The crafted request includes a SQL injection payload within the <code>BRANCH_ID</code> parameter.</li>
<li>The application fails to properly sanitize the <code>BRANCH_ID</code> input.</li>
<li>The unsanitized input is incorporated into a SQL query executed by the application.</li>
<li>The SQL injection payload manipulates the query to extract sensitive data or modify database records.</li>
<li>The application returns the results of the manipulated query to the attacker.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6038 can lead to unauthorized access to the Vehicle Showroom Management System&rsquo;s database. This could result in the disclosure of sensitive customer information (names, addresses, financial details), modification of vehicle inventory data, or even complete compromise of the application&rsquo;s data integrity. The impact would depend on the level of privileges the application&rsquo;s database user has and the attacker&rsquo;s objectives, but it is a high-severity vulnerability due to the ease of exploitation and potential for significant data breach or manipulation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious POST requests to <code>/util/RegisterCustomerFunction.php</code> containing unusual characters or SQL keywords in the <code>BRANCH_ID</code> parameter using the Sigma rule &ldquo;Detect SQL Injection Attempt via BRANCH_ID Parameter&rdquo;.</li>
<li>Apply input validation and sanitization to the <code>BRANCH_ID</code> parameter within the <code>/util/RegisterCustomerFunction.php</code> file to prevent SQL injection.</li>
<li>Monitor database logs for anomalous queries originating from the Vehicle Showroom Management System&rsquo;s application user.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6038</category><category>sql-injection</category><category>web-application</category></item><item><title>WordPress adivaha Travel Plugin SQL Injection Vulnerability (CVE-2023-54359)</title><link>https://feed.craftedsignal.io/briefs/2026-04-adivaha-sql-injection/</link><pubDate>Thu, 09 Apr 2026 21:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-adivaha-sql-injection/</guid><description>The WordPress adivaha Travel Plugin version 2.3 is vulnerable to time-based blind SQL injection via the 'pid' GET parameter, allowing unauthenticated attackers to inject SQL code through the /mobile-app/v3/ endpoint for potential data extraction or denial of service.</description><content:encoded><![CDATA[<p>The adivaha Travel plugin 2.3 for WordPress is susceptible to a time-based blind SQL injection vulnerability (CVE-2023-54359). This flaw allows unauthenticated attackers to inject malicious SQL code through the &lsquo;pid&rsquo; GET parameter in requests to the <code>/mobile-app/v3/</code> endpoint. By crafting specific &lsquo;pid&rsquo; values with XOR-based payloads, attackers can manipulate database queries. This vulnerability can be exploited to extract sensitive database information or to cause a denial-of-service condition on the affected WordPress site. Publicly available exploits exist, increasing the risk of widespread exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable adivaha Travel Plugin version 2.3.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/mobile-app/v3/</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>pid</code> GET parameter, utilizing XOR-based payloads to bypass input validation or sanitization.</li>
<li>The server processes the malicious SQL query against the WordPress database.</li>
<li>Due to the time-based blind SQL injection, the attacker infers information about the database by observing the response time of the server.</li>
<li>Through repeated requests, the attacker extracts sensitive data from the database, such as user credentials, API keys, or other confidential information.</li>
<li>Alternatively, the attacker injects SQL code to cause a denial-of-service condition, such as by creating a very long delay.</li>
<li>The attacker uses the exfiltrated data for malicious purposes or further compromise of the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to the extraction of sensitive information from the WordPress database, potentially compromising user accounts, customer data, and other confidential information. Attackers could gain complete control over the affected website, leading to defacement, malware distribution, or further attacks on other systems. A successful denial-of-service attack could also disrupt the availability of the website, impacting business operations and user experience.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for the adivaha Travel Plugin to remediate CVE-2023-54359.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious adivaha Travel Plugin SQL Injection Attempt</code> to your SIEM to identify potential exploitation attempts targeting the <code>/mobile-app/v3/</code> endpoint.</li>
<li>Inspect web server logs for requests to <code>/mobile-app/v3/</code> containing suspicious characters or SQL syntax in the <code>pid</code> parameter to identify exploitation attempts (reference: vulnerable endpoint <code>/mobile-app/v3/</code>).</li>
<li>Monitor network traffic for connections to the URLs listed in the IOCs (reference: <code>https://www.exploit-db.com/exploits/51655</code> and <code>https://www.vulncheck.com/advisories/wordpress-adivaha-travel-plugin-sql-injection-via-pid</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>wordpress</category><category>sql-injection</category><category>cve-2023-54359</category></item><item><title>PHPGurukul News Portal Project SQL Injection Vulnerability (CVE-2026-5837)</title><link>https://feed.craftedsignal.io/briefs/2026-04-phpgurukul-sql-injection/</link><pubDate>Thu, 09 Apr 2026 04:17:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-phpgurukul-sql-injection/</guid><description>PHPGurukul News Portal Project version 4.1 is vulnerable to SQL injection via the Comment parameter in /news-details.php, potentially allowing remote attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>CVE-2026-5837 describes a SQL injection vulnerability affecting PHPGurukul News Portal Project version 4.1. The vulnerability resides in the <code>/news-details.php</code> file and is triggered by manipulating the <code>Comment</code> argument.  Successful exploitation allows remote attackers to inject arbitrary SQL commands into the application&rsquo;s database queries. The vulnerability has a CVSS v3.1 score of 7.3, indicating a high severity. Publicly available exploits exist, increasing the risk of active exploitation. Organizations using PHPGurukul News Portal Project 4.1 are urged to investigate and mitigate this vulnerability immediately. The lack of specific patching information emphasizes the importance of proactive detection and prevention measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable PHPGurukul News Portal Project 4.1 instance accessible over the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/news-details.php</code> endpoint.</li>
<li>Within the request, the <code>Comment</code> parameter is manipulated to inject SQL code. For example, the attacker might inject a payload such as <code>' OR '1'='1</code> to bypass authentication or extract data.</li>
<li>The vulnerable application processes the crafted request without proper sanitization of the <code>Comment</code> parameter.</li>
<li>The injected SQL code is embedded within a database query executed by the application.</li>
<li>The database server executes the attacker-controlled SQL query, potentially allowing the attacker to read, modify, or delete data.</li>
<li>The application returns the results of the injected SQL query to the attacker, potentially revealing sensitive information or confirming successful code execution.</li>
<li>The attacker leverages the SQL injection vulnerability to potentially gain unauthorized access to sensitive data, modify website content, or even gain control of the underlying server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5837 can lead to unauthorized access to sensitive information stored in the PHPGurukul News Portal Project&rsquo;s database. An attacker could potentially steal user credentials, financial data, or other confidential information. The attacker could also modify website content, inject malicious code, or even gain control of the underlying server. Given the public availability of exploits, vulnerable instances are at immediate risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detecting SQL Injection in PHPGurukul News Portal</code> to identify attempts to exploit CVE-2026-5837 by monitoring for suspicious characters in the <code>cs-uri-query</code> field of web server logs.</li>
<li>Apply web application firewall (WAF) rules to block requests containing common SQL injection payloads.</li>
<li>Review and harden the <code>/news-details.php</code> page to properly sanitize the Comment input field.</li>
<li>Monitor web server logs for unusual activity, especially related to the <code>/news-details.php</code> endpoint, and correlate with other security events.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sql-injection</category><category>web-application</category><category>php</category><category>CVE-2026-5837</category></item><item><title>code-projects Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5829)</title><link>https://feed.craftedsignal.io/briefs/2026-04-simple-it-forum-sql-injection/</link><pubDate>Thu, 09 Apr 2026 02:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-simple-it-forum-sql-injection/</guid><description>A remote SQL injection vulnerability (CVE-2026-5829) exists in code-projects Simple IT Discussion Forum 1.0 due to improper handling of the 'post_id' argument in the '/pages/content.php' file, allowing attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>CVE-2026-5829 is a SQL injection vulnerability affecting version 1.0 of the code-projects Simple IT Discussion Forum. The vulnerability resides in the <code>/pages/content.php</code> file and is triggered by manipulating the <code>post_id</code> argument. Successful exploitation allows a remote attacker to execute arbitrary SQL queries on the underlying database. Given the public disclosure of the exploit, instances of Simple IT Discussion Forum 1.0 are at immediate risk. This is a critical vulnerability as it potentially allows an attacker to read sensitive data, modify existing data, or even gain complete control of the application and its underlying infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Simple IT Discussion Forum 1.0 instance accessible over the network.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting <code>/pages/content.php</code>.</li>
<li>The crafted request includes the <code>post_id</code> parameter containing a SQL injection payload.</li>
<li>The application fails to properly sanitize the <code>post_id</code> input.</li>
<li>The unsanitized <code>post_id</code> parameter is used in a SQL query executed against the database.</li>
<li>The SQL injection payload allows the attacker to bypass intended query logic.</li>
<li>The attacker is able to extract sensitive information from the database or modify data.</li>
<li>The attacker could potentially leverage the SQL injection to execute operating system commands via SQL Server&rsquo;s <code>xp_cmdshell</code> or similar functionality if available.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5829 can lead to significant data breaches, data manipulation, and potential system compromise.  Attackers could gain unauthorized access to sensitive user data, including credentials and personal information. The impact ranges from defacement of the forum to complete control of the web server hosting the application. The vulnerability allows attackers to read, modify, or delete data stored in the forum&rsquo;s database.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to the <code>post_id</code> parameter in <code>/pages/content.php</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Attempts via POST ID&rdquo; to identify potential exploitation attempts targeting the <code>post_id</code> parameter.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads in the <code>post_id</code> parameter.</li>
<li>Review and harden database server configurations to limit the privileges of the database user account used by the Simple IT Discussion Forum application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-5829</category></item><item><title>Drizzle ORM SQL Injection Vulnerability (CVE-2026-39356)</title><link>https://feed.craftedsignal.io/briefs/2026-04-drizzle-sql-injection/</link><pubDate>Wed, 08 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-drizzle-sql-injection/</guid><description>Drizzle ORM versions before 0.45.2 and 1.0.0-beta.20 are vulnerable to SQL injection due to improper escaping of SQL identifiers, allowing attackers to inject malicious SQL code through manipulated input leading to potential data breaches.</description><content:encoded><![CDATA[<p>Drizzle ORM, a TypeScript ORM, contains a SQL injection vulnerability (CVE-2026-39356) in versions prior to 0.45.2 and 1.0.0-beta.20. The vulnerability stems from improper escaping of quoted SQL identifiers within the <code>escapeName()</code> implementations. Specifically, embedded identifier delimiters were not properly escaped before being enclosed in quotes or backticks. This allows attackers to inject arbitrary SQL code by manipulating input passed to APIs like <code>sql.identifier()</code> or <code>.as()</code> which are used to construct SQL identifiers or aliases. Successful exploitation could lead to unauthorized data access, modification, or other database manipulation. Organizations using affected versions of Drizzle ORM are at risk. This issue is resolved in versions 0.45.2 and 1.0.0-beta.20.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an application using a vulnerable version of Drizzle ORM (prior to 0.45.2 or 1.0.0-beta.20).</li>
<li>Attacker locates input fields or API endpoints that utilize <code>sql.identifier()</code> or <code>.as()</code> to construct SQL queries.</li>
<li>Attacker crafts malicious input containing embedded identifier delimiters (e.g., quotes or backticks) and SQL code.</li>
<li>The application passes the attacker-controlled input to <code>sql.identifier()</code> or <code>.as()</code> without proper sanitization.</li>
<li>Drizzle ORM&rsquo;s vulnerable <code>escapeName()</code> function fails to properly escape the malicious delimiters.</li>
<li>The crafted SQL identifier is incorporated into a larger SQL query.</li>
<li>The application executes the compromised SQL query against the database.</li>
<li>The injected SQL code executes, allowing the attacker to perform unauthorized actions such as data exfiltration or modification.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39356 allows attackers to inject arbitrary SQL queries into the application&rsquo;s database interactions. This can lead to sensitive data exposure, unauthorized data modification or deletion, and potentially full database compromise. The severity of the impact depends on the application&rsquo;s database permissions and the sensitivity of the data stored within. Organizations in all sectors utilizing vulnerable Drizzle ORM versions are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Drizzle ORM to version 0.45.2 or 1.0.0-beta.20 to remediate CVE-2026-39356.</li>
<li>Implement robust input validation and sanitization on all user-supplied input that is used in SQL queries, even after upgrading Drizzle ORM.</li>
<li>Deploy the Sigma rule &ldquo;Detect Drizzle ORM SQL Injection Attempt&rdquo; to identify exploitation attempts in your environment.</li>
<li>Monitor web server logs for suspicious patterns in HTTP requests indicative of SQL injection attempts (cs-uri-query, cs-uri-stem log fields).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>drizzle-orm</category><category>cve-2026-39356</category><category>typescript</category><category>orm</category></item><item><title>PowerJob SQL Injection Vulnerability (CVE-2026-5736)</title><link>https://feed.craftedsignal.io/briefs/2026-04-powerjob-sqli/</link><pubDate>Tue, 07 Apr 2026 19:16:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-powerjob-sqli/</guid><description>A remote SQL injection vulnerability, CVE-2026-5736, exists in PowerJob versions 5.1.0 through 5.1.2 within the detailPlus Endpoint, potentially allowing unauthenticated attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>CVE-2026-5736 is a SQL injection vulnerability affecting PowerJob, an open-source distributed job scheduling and management platform. The vulnerability resides in the <code>InstanceController.java</code> file within the <code>powerjob-server</code> component, specifically in versions 5.1.0, 5.1.1, and 5.1.2. An attacker can remotely exploit this vulnerability by manipulating the <code>customQuery</code> argument of the <code>detailPlus</code> endpoint, injecting malicious SQL code that is then executed by the application&rsquo;s database. This could lead to unauthorized data access, modification, or deletion. Despite being reported through an issue report, the project has not yet provided a patch or mitigation. This vulnerability poses a significant risk to organizations using vulnerable versions of PowerJob, potentially enabling attackers to compromise sensitive data and disrupt critical job scheduling processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable PowerJob instance running versions 5.1.0, 5.1.1, or 5.1.2.</li>
<li>Attacker crafts a malicious SQL injection payload, targeting the <code>customQuery</code> parameter of the <code>/detailPlus</code> endpoint.</li>
<li>Attacker sends a crafted HTTP request to the vulnerable <code>/detailPlus</code> endpoint, embedding the SQL injection payload within the <code>customQuery</code> parameter.</li>
<li>The PowerJob server receives the request and processes the <code>customQuery</code> parameter without proper sanitization or validation.</li>
<li>The unsanitized <code>customQuery</code> value is incorporated into an SQL query executed against the PowerJob database.</li>
<li>The injected SQL code is executed, allowing the attacker to bypass intended security restrictions and perform unauthorized database operations.</li>
<li>The attacker may extract sensitive data, modify existing records, or even gain control over the underlying database server.</li>
<li>Depending on the attacker&rsquo;s objectives, they may leverage the compromised database to pivot to other systems or disrupt critical job scheduling processes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5736 can lead to a complete compromise of the PowerJob server and its associated database. An attacker could potentially gain access to sensitive data related to job schedules, configurations, and execution history. They could also modify existing jobs, create new malicious jobs, or even disrupt the entire job scheduling system. The exact impact depends on the scope of data stored in the PowerJob database and the attacker&rsquo;s objectives, but could include data theft, service disruption, and potentially lateral movement within the compromised network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PowerJob to a patched version that addresses CVE-2026-5736 as soon as it becomes available from the vendor.</li>
<li>Implement input validation and sanitization on the <code>customQuery</code> parameter in the <code>detailPlus</code> endpoint to prevent SQL injection attacks.</li>
<li>Deploy the provided Sigma rule <code>Detect Suspicious PowerJob customQuery Parameter</code> to detect potential exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious requests to the <code>/detailPlus</code> endpoint containing potentially malicious SQL injection payloads, as covered in the logsource for the Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>vulnerability</category><category>powerjob</category></item><item><title>Windmill CE/EE SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-windmill-sqli/</link><pubDate>Tue, 07 Apr 2026 17:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-windmill-sqli/</guid><description>Windmill CE/EE versions 1.276.0 through 1.603.2 are vulnerable to SQL injection in the folder ownership management, allowing authenticated attackers to inject SQL through the owner parameter, leading to sensitive data access, token forgery, and arbitrary code execution.</description><content:encoded><![CDATA[<p>Windmill CE and EE, versions 1.276.0 through 1.603.2, are susceptible to an SQL injection vulnerability (CVE-2026-23696) affecting the folder ownership management functionality. An authenticated attacker can exploit this flaw by injecting SQL code via the <code>owner</code> parameter. Successful exploitation allows the attacker to read sensitive information, including the JWT signing secret and administrative user identifiers. This access enables them to forge administrative tokens, ultimately leading to arbitrary code execution through the workflow execution endpoints. This vulnerability poses a significant risk to organizations using affected versions of Windmill, potentially leading to data breaches and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Windmill CE/EE instance.</li>
<li>The attacker navigates to the folder ownership management section.</li>
<li>The attacker crafts a malicious HTTP request to modify folder ownership, injecting SQL code into the <code>owner</code> parameter.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL query to the database.</li>
<li>The SQL injection allows the attacker to extract sensitive information from the database, such as the JWT signing secret and administrative user credentials.</li>
<li>The attacker uses the extracted JWT signing secret to forge an administrative token.</li>
<li>The attacker leverages the forged administrative token to authenticate to the workflow execution endpoint.</li>
<li>The attacker executes arbitrary code on the server via the workflow execution endpoint, achieving remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-23696 can lead to complete compromise of the Windmill CE/EE instance. An attacker can gain unauthorized access to sensitive data, including credentials and internal application secrets. They can also execute arbitrary code on the server, potentially leading to data breaches, system downtime, and further lateral movement within the network. This vulnerability affects all organizations using Windmill CE/EE versions 1.276.0 through 1.603.2, and can result in significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Windmill CE/EE to version 1.603.3 or later to patch CVE-2026-23696 as per the vendor&rsquo;s release notes (<a href="https://github.com/windmill-labs/windmill/releases/tag/v1.603.3">https://github.com/windmill-labs/windmill/releases/tag/v1.603.3</a>).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Windmill Folder Ownership Modification</code> to identify potential SQL injection attempts within HTTP requests to the folder ownership management endpoint.</li>
<li>Monitor web server logs for suspicious activity, such as SQL errors or unusual characters in the <code>owner</code> parameter of requests targeting the folder ownership management endpoint (webserver log source).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>rce</category><category>windmill</category></item><item><title>ChurchCRM SQL Injection Vulnerability (CVE-2026-35567)</title><link>https://feed.craftedsignal.io/briefs/2026-04-churchcrm-sqli/</link><pubDate>Tue, 07 Apr 2026 16:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-churchcrm-sqli/</guid><description>ChurchCRM versions prior to 7.1.0 are vulnerable to SQL injection via the NewRole POST parameter, allowing authenticated users with the ManageGroups role to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>ChurchCRM, an open-source church management system, is susceptible to SQL injection attacks in versions prior to 7.1.0. The vulnerability, identified as CVE-2026-35567, resides in the <code>src/MemberRoleChange.php</code> file, specifically within the <code>NewRole</code> POST parameter. Exploitation requires an attacker to have an authenticated session with the <code>ManageGroups</code> role, along with knowledge of valid <code>GroupID</code> and <code>PersonID</code> values, which can be obtained from the <code>GroupView</code> or <code>PersonView</code> pages. Successful exploitation can lead to unauthorized data access, modification, or deletion within the ChurchCRM database. The vulnerability is resolved in ChurchCRM version 7.1.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains authenticated access to ChurchCRM with a user account possessing the <code>ManageGroups</code> role.</li>
<li>Attacker identifies valid <code>GroupID</code> and <code>PersonID</code> values by browsing the <code>GroupView</code> or <code>PersonView</code> pages.</li>
<li>Attacker crafts a malicious HTTP POST request targeting <code>src/MemberRoleChange.php</code>.</li>
<li>The POST request includes the <code>NewRole</code> parameter containing a crafted SQL injection payload, exploiting the lack of proper integer validation.</li>
<li>The application executes the SQL query incorporating the injected payload.</li>
<li>The attacker retrieves sensitive data from the database, modifies existing data, or injects malicious data.</li>
<li>The attacker could leverage the SQL injection to create a new administrative user.</li>
<li>The attacker uses the new administrative account to take complete control of the ChurchCRM instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-35567) in ChurchCRM can result in the complete compromise of the application&rsquo;s database. An attacker can gain unauthorized access to sensitive church member data, including personally identifiable information (PII). This can lead to data breaches, identity theft, and financial fraud. Malicious actors could also modify or delete data, disrupting church operations and potentially causing reputational damage. The impact is critical, especially considering the sensitive nature of the data managed by ChurchCRM.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ChurchCRM installations to version 7.1.0 or later to remediate the SQL injection vulnerability (CVE-2026-35567).</li>
<li>Deploy the provided Sigma rule to detect suspicious POST requests to <code>src/MemberRoleChange.php</code> containing potential SQL injection attempts.</li>
<li>Monitor web server logs for unusual activity related to <code>MemberRoleChange.php</code>, especially concerning the <code>NewRole</code> parameter (webserver log source).</li>
<li>Implement input validation and sanitization measures for all user-supplied data, focusing on integer validation for parameters like <code>NewRole</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-35567</category><category>sql-injection</category><category>churchcrm</category></item><item><title>WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-35395)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wegia-sql-injection/</link><pubDate>Mon, 06 Apr 2026 21:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wegia-sql-injection/</guid><description>WeGIA web manager versions prior to 3.6.9 are vulnerable to SQL injection, allowing authenticated users to execute arbitrary SQL commands by directly interpolating the id_memorando parameter from $_REQUEST into SQL queries without validation, as identified by CVE-2026-35395.</description><content:encoded><![CDATA[<p>WeGIA (Web gerenciador para instituições assistenciais) is a web manager for charitable institutions. Versions prior to 3.6.9 are susceptible to a critical SQL injection vulnerability (CVE-2026-35395) found in the <code>dao/memorando/DespachoDAO.php</code> file. The <code>id_memorando</code> parameter, extracted from the <code>$_REQUEST</code> array, is directly incorporated into SQL queries without any validation or sanitization. This flaw enables authenticated users with low privileges to inject arbitrary SQL commands, potentially leading to complete database compromise. Successful exploitation could result in data breaches, modification of sensitive information, and denial-of-service conditions. Defenders should prioritize upgrading to version 3.6.9 or applying provided patches immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the WeGIA web application.</li>
<li>The user navigates to a page that triggers the execution of <code>dao/memorando/DespachoDAO.php</code>.</li>
<li>The application extracts the <code>id_memorando</code> parameter from the <code>$_REQUEST</code> array using the HTTP GET or POST method.</li>
<li>The attacker crafts a malicious <code>id_memorando</code> parameter containing SQL injection payloads (e.g., <code>1; DROP TABLE users; --</code>).</li>
<li>The application directly interpolates the attacker-controlled <code>id_memorando</code> parameter into an SQL query without proper sanitization within the <code>DespachoDAO.php</code> file.</li>
<li>The database server executes the injected SQL command, allowing the attacker to manipulate database records, read sensitive data, or execute arbitrary commands.</li>
<li>The attacker may exfiltrate sensitive data from the database, such as user credentials, financial information, or confidential memorandums.</li>
<li>The attacker achieves complete database compromise, potentially leading to a full system takeover.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The SQL injection vulnerability in WeGIA versions prior to 3.6.9 poses a significant risk to charitable institutions using the software. Successful exploitation can lead to unauthorized access to sensitive donor information, financial records, and confidential communications. The potential impact includes data breaches, financial losses, reputational damage, and legal liabilities. Given the nature of the targeted institutions, this vulnerability could severely disrupt their operations and erode public trust, potentially affecting thousands of individuals. Organizations that do not apply the patch are vulnerable to data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade WeGIA to version 3.6.9 to remediate the SQL injection vulnerability described in CVE-2026-35395.</li>
<li>Implement input validation and sanitization for all user-supplied data, especially the <code>id_memorando</code> parameter in <code>DespachoDAO.php</code>, to prevent future SQL injection attacks.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious WeGIA SQL Injection Attempts&rdquo; to your SIEM and tune it for your environment to detect exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads targeting the <code>dao/memorando/DespachoDAO.php</code> endpoint.</li>
<li>Restrict database access privileges to the minimum required for WeGIA to function correctly.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-35395</category><category>sql-injection</category><category>web-application</category></item><item><title>Media Library Assistant WordPress Plugin SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-mla-sql-injection/</link><pubDate>Mon, 06 Apr 2026 15:17:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mla-sql-injection/</guid><description>The Media Library Assistant WordPress plugin through version 3.34 is vulnerable to SQL injection, allowing attackers to manipulate database queries.</description><content:encoded><![CDATA[<p>CVE-2026-34885 describes an SQL Injection vulnerability affecting the Media Library Assistant WordPress plugin. This plugin, developed by David Lingren, is vulnerable in versions up to and including 3.34. The vulnerability stems from improper neutralization of special elements used in SQL commands, potentially allowing attackers to inject malicious SQL code. Exploitation could lead to unauthorized data access, modification, or deletion within the WordPress database. Given the widespread use of WordPress and its plugin ecosystem, this vulnerability presents a significant risk to websites utilizing the affected plugin. Successful exploitation could compromise sensitive information, deface websites, or even gain administrative control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a WordPress website using Media Library Assistant version 3.34 or earlier.</li>
<li>The attacker crafts a malicious HTTP request containing SQL injection payload in a plugin parameter, such as a search query or media metadata field.</li>
<li>The crafted request is sent to the vulnerable endpoint within the Media Library Assistant plugin.</li>
<li>The plugin fails to properly sanitize or neutralize the SQL injection payload.</li>
<li>The unsanitized payload is incorporated into an SQL query executed against the WordPress database.</li>
<li>The injected SQL code manipulates the query logic, allowing the attacker to bypass security checks.</li>
<li>The attacker extracts sensitive data from the database, such as user credentials, posts, or other stored information.</li>
<li>The attacker could potentially modify or delete data, or even gain administrative access to the WordPress site.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to a range of damaging outcomes. Attackers could gain unauthorized access to sensitive data stored within the WordPress database, including user credentials, customer information, and proprietary content. This data could be exfiltrated and sold on the dark web or used for further malicious activities. Website defacement, data modification, and complete site compromise are also potential consequences. The number of affected websites is potentially large, given the popularity of WordPress and its extensive plugin ecosystem.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Media Library Assistant WordPress plugin to a version higher than 3.34 to patch CVE-2026-34885.</li>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempts via HTTP Request</code> to identify potential exploitation attempts in web server logs.</li>
<li>Implement a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attacks against WordPress plugins.</li>
<li>Enable regular security audits of WordPress installations and plugins to identify and address vulnerabilities promptly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>plugin-vulnerability</category></item><item><title>GLPI Unauthenticated Time-Based Blind SQL Injection Vulnerability (CVE-2026-26263)</title><link>https://feed.craftedsignal.io/briefs/2026-04-glpi-sql-injection/</link><pubDate>Mon, 06 Apr 2026 15:17:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-glpi-sql-injection/</guid><description>GLPI versions 11.0.0 to before 11.0.6 are susceptible to an unauthenticated time-based blind SQL injection vulnerability in the search engine, allowing remote attackers to potentially extract sensitive information.</description><content:encoded><![CDATA[<p>GLPI, a widely used free asset and IT management software, is vulnerable to a critical security flaw. Specifically, versions 11.0.0 to before 11.0.6 contain an unauthenticated time-based blind SQL injection vulnerability (CVE-2026-26263) within its search engine functionality. This vulnerability allows remote attackers to inject malicious SQL code without needing prior authentication. Exploitation could lead to unauthorized data access, modification, or deletion, potentially compromising the entire GLPI instance and the sensitive information it manages. The vulnerability was reported on April 6th, 2026 and patched in version 11.0.6. Organizations using affected versions of GLPI should upgrade immediately to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a GLPI instance running a vulnerable version (11.0.0 to 11.0.5).</li>
<li>The attacker crafts a malicious HTTP request targeting the search engine functionality.</li>
<li>The crafted request includes a time-based blind SQL injection payload within a search query parameter.</li>
<li>The GLPI server processes the malicious SQL query without proper sanitization.</li>
<li>The injected SQL code interacts with the database, causing time delays based on conditional logic.</li>
<li>The attacker analyzes the response times to infer the results of the injected SQL queries.</li>
<li>Through repeated requests, the attacker extracts sensitive data from the database, such as usernames, passwords, or configuration details.</li>
<li>The attacker uses the extracted credentials to gain unauthorized access to the GLPI system or other related resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-26263 can lead to complete compromise of the GLPI instance. Attackers can access sensitive IT asset data, user credentials, and system configurations. This can result in data breaches, financial loss, and reputational damage. Given GLPI&rsquo;s widespread use in IT management, a successful attack could impact numerous organizations across various sectors. If exploited, attackers can use the compromised GLPI instance as a pivot point to further compromise the internal network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade GLPI to version 11.0.6 or later to patch CVE-2026-26263.</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts targeting the GLPI search functionality.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads, focusing on parameters used by the GLPI search engine.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection vulnerabilities in web applications.</li>
<li>Regularly review and update web application firewalls (WAFs) with the latest rules to block known SQL injection patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>glpi</category><category>cve-2026-26263</category><category>web-application</category></item><item><title>SQL Injection Vulnerability in projectworlds Car Rental System 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-04-car-rental-sql-injection/</link><pubDate>Mon, 06 Apr 2026 09:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-car-rental-sql-injection/</guid><description>A SQL injection vulnerability (CVE-2026-5637) exists in projectworlds Car Rental System 1.0's /message_admin.php, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'Message' argument.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in projectworlds Car Rental System version 1.0. This flaw is located within the <code>/message_admin.php</code> file, specifically affecting the Parameter Handler component. By manipulating the <code>Message</code> argument, a remote attacker can inject malicious SQL code, potentially leading to unauthorized data access or modification. The vulnerability, assigned CVE-2026-5637, has a CVSS v3.1 score of 7.3, indicating a high severity. Public exploit code is available, increasing the risk of exploitation. This vulnerability poses a significant threat to systems running the affected Car Rental System version, as it can be exploited without authentication. Defenders should prioritize patching or mitigating this vulnerability to prevent potential data breaches or system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable instance of projectworlds Car Rental System 1.0 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/message_admin.php</code> file.</li>
<li>Within the HTTP request, the attacker manipulates the <code>Message</code> parameter with a SQL injection payload. This payload could be designed to extract data or modify database entries.</li>
<li>The vulnerable <code>/message_admin.php</code> script processes the attacker-supplied input without proper sanitization or validation.</li>
<li>The injected SQL payload is executed against the underlying database server.</li>
<li>The database server processes the malicious SQL query, potentially returning sensitive data to the attacker or modifying data within the database.</li>
<li>The attacker receives the results of the injected SQL query, which may include sensitive data such as user credentials, financial information, or other confidential data.</li>
<li>The attacker can then use the compromised data to further their attack, potentially gaining complete control over the vulnerable system or pivoting to other systems within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-5637) in projectworlds Car Rental System 1.0 could lead to significant data breaches, unauthorized access to sensitive information, and potential system compromise. Attackers could gain access to customer data, financial records, and other confidential information stored within the system&rsquo;s database. The number of potential victims is dependent on the number of installations running the vulnerable version. Affected sectors include transportation, tourism, and any business using projectworlds Car Rental System 1.0 for managing their car rental operations. If exploited, the vulnerability may result in financial losses, reputational damage, and legal liabilities for the affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for projectworlds Car Rental System 1.0 to address the SQL injection vulnerability (CVE-2026-5637).</li>
<li>Implement input validation and sanitization measures on the <code>/message_admin.php</code> file to prevent SQL injection attacks.</li>
<li>Deploy a web application firewall (WAF) with rules to detect and block SQL injection attempts targeting the <code>Message</code> parameter in the <code>/message_admin.php</code> file.</li>
<li>Monitor web server logs for suspicious activity, such as requests with unusual characters or SQL syntax in the <code>Message</code> parameter, to detect potential exploitation attempts. Use the provided Sigma rule &ldquo;Detect SQL Injection Attempt in Car Rental System&rdquo; for this purpose.</li>
<li>Regularly audit and review the codebase of projectworlds Car Rental System 1.0 for other potential vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-5637</category></item><item><title>Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25704)</title><link>https://feed.craftedsignal.io/briefs/2026-04-kados-sql-injection/</link><pubDate>Sun, 05 Apr 2026 21:16:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kados-sql-injection/</guid><description>Kados R10 GreenBee is vulnerable to SQL injection (CVE-2019-25704), allowing attackers to manipulate database queries via the filter_user_mail parameter, potentially leading to data extraction or modification.</description><content:encoded><![CDATA[<p>Kados R10 GreenBee is susceptible to SQL injection attacks due to improper input validation. Specifically, the <code>filter_user_mail</code> parameter does not adequately sanitize user-supplied input, which enables attackers to inject arbitrary SQL code into database queries. Publicly disclosed as CVE-2019-25704, successful exploitation of this vulnerability can result in the unauthorized disclosure of sensitive information, modification of existing data, or potentially complete compromise of the database. The affected software is Kados R10 GreenBee; specific versions are not mentioned in the source.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the Kados R10 GreenBee application running.</li>
<li>The attacker locates the <code>filter_user_mail</code> parameter in the application&rsquo;s web interface or API.</li>
<li>The attacker crafts a malicious HTTP request containing SQL code injected into the <code>filter_user_mail</code> parameter.</li>
<li>The application&rsquo;s backend processes the crafted request without proper sanitization.</li>
<li>The injected SQL code is executed against the database.</li>
<li>The attacker extracts sensitive data from the database, such as user credentials or financial records, by using SQL injection techniques like <code>UNION SELECT</code>.</li>
<li>Alternatively, the attacker modifies data within the database, such as altering user privileges or inserting malicious content.</li>
<li>The attacker uses the compromised database to further compromise the application or the underlying system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2019-25704 allows attackers to extract sensitive data (user credentials, financial records), modify existing data (alter user privileges), or potentially compromise the entire database. The number of affected installations is unknown, but unpatched systems are vulnerable. This could lead to significant data breaches, financial losses, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for HTTP requests targeting the <code>filter_user_mail</code> parameter with suspicious SQL syntax (e.g., <code>UNION</code>, <code>SELECT</code>, <code>--</code>, <code>/* */</code>) to identify potential exploitation attempts. This activity can be detected with the provided Sigma rule for webserver logs.</li>
<li>Deploy a web application firewall (WAF) rule to block requests containing SQL injection payloads targeting the <code>filter_user_mail</code> parameter.</li>
<li>Apply the patch or upgrade to a version of Kados R10 GreenBee that addresses CVE-2019-25704.</li>
<li>Implement input validation and sanitization on all user-supplied input, especially the <code>filter_user_mail</code> parameter, to prevent SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2019-25704</category><category>web-application</category></item><item><title>Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25702)</title><link>https://feed.craftedsignal.io/briefs/2026-04-kados-r10-greenbee-sqli/</link><pubDate>Sun, 05 Apr 2026 21:16:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kados-r10-greenbee-sqli/</guid><description>Kados R10 GreenBee is vulnerable to SQL injection via the id_project parameter, allowing attackers to manipulate database queries to extract sensitive information or modify data.</description><content:encoded><![CDATA[<p>Kados R10 GreenBee is susceptible to SQL injection attacks due to improper input validation of the <code>id_project</code> parameter. This vulnerability, identified as CVE-2019-25702, allows a remote attacker to inject arbitrary SQL code into database queries. By crafting malicious requests, an attacker can potentially extract sensitive data, modify existing records, or even gain unauthorized access to the underlying database. The vulnerability was published on April 5, 2026, and poses a significant risk to organizations using affected versions of Kados R10 GreenBee, potentially leading to data breaches and system compromise. Defenders should prioritize patching or mitigating this vulnerability to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Kados R10 GreenBee instance.</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that uses the <code>id_project</code> parameter in a SQL query.</li>
<li>The attacker injects SQL code into the <code>id_project</code> parameter within the crafted HTTP request. For example, <code>id_project=1' OR '1'='1</code>.</li>
<li>The Kados R10 GreenBee application processes the request and executes the injected SQL code against the database.</li>
<li>The database server executes the malicious SQL query, potentially returning sensitive information.</li>
<li>The attacker retrieves the extracted data from the application&rsquo;s response.</li>
<li>Depending on the injected SQL code, the attacker may modify database records.</li>
<li>The attacker may gain unauthorized access to the database and perform further malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2019-25702) can lead to unauthorized access to sensitive database information, including user credentials, financial data, and other confidential records. This can result in data breaches, financial loss, reputational damage, and legal liabilities for affected organizations. The vulnerability allows attackers to read and modify data, potentially disrupting business operations. The CVSS v3.1 score of 8.2 highlights the severity of this issue.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrades for Kados R10 GreenBee to address CVE-2019-25702.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious SQL Injection Attempts in Kados R10 GreenBee</code> to your SIEM to detect exploitation attempts by monitoring HTTP request parameters.</li>
<li>Implement input validation and sanitization for all user-supplied data, especially for parameters used in database queries, to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious activity, such as unusual characters or SQL keywords in the <code>id_project</code> parameter of HTTP requests, as shown in the log source for the Sigma rules below.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2019-25702</category></item><item><title>C4G Basic Laboratory Information System 3.4 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-c4g-sql-injection/</link><pubDate>Sun, 05 Apr 2026 21:16:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-c4g-sql-injection/</guid><description>C4G Basic Laboratory Information System 3.4 is vulnerable to SQL injection, allowing unauthenticated attackers to execute arbitrary SQL commands via the 'site' parameter in GET requests to the users_select.php endpoint, potentially leading to sensitive data extraction.</description><content:encoded><![CDATA[<p>C4G Basic Laboratory Information System version 3.4 is susceptible to SQL injection vulnerabilities. The vulnerability allows unauthenticated attackers to inject malicious SQL code through the <code>site</code> parameter in HTTP GET requests targeting the <code>users_select.php</code> endpoint. Successful exploitation could grant attackers unauthorized access to sensitive data stored within the system&rsquo;s database, including confidential patient records and system credentials. This vulnerability poses a significant threat to organizations utilizing the affected LIS, as it may lead to data breaches, compliance violations, and potential compromise of the entire system. Public exploits are available, increasing the risk of widespread exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable C4G Basic Laboratory Information System 3.4 instance.</li>
<li>The attacker crafts a malicious SQL injection payload designed to extract data or execute commands.</li>
<li>The attacker sends an HTTP GET request to the <code>users_select.php</code> endpoint with the crafted SQL payload injected into the <code>site</code> parameter.</li>
<li>The vulnerable application processes the malicious SQL query without proper sanitization.</li>
<li>The database executes the injected SQL commands, potentially returning sensitive data.</li>
<li>The attacker receives the database response containing the extracted information or the results of the executed commands.</li>
<li>The attacker uses the extracted information, such as user credentials or patient data, for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows unauthorized access to sensitive data stored within the C4G Basic Laboratory Information System 3.4 database. This includes patient records, system credentials, and potentially other confidential information. The impact can range from data breaches and privacy violations to complete system compromise, depending on the privileges of the database user and the extent of the attacker&rsquo;s knowledge.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for C4G Basic Laboratory Information System 3.4 to remediate the SQL injection vulnerability described in CVE-2019-25678.</li>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempt in C4G Basic LIS</code> to identify potential exploitation attempts against the <code>users_select.php</code> endpoint.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection attacks against web applications.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2019-25678</category></item><item><title>SuiteCRM 7.10.7 Time-Based SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-suitecrm-sqli/</link><pubDate>Sun, 05 Apr 2026 21:16:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-suitecrm-sqli/</guid><description>SuiteCRM 7.10.7 is vulnerable to time-based SQL injection in the record parameter of the Users module DetailView action, allowing authenticated attackers to manipulate database queries and potentially extract sensitive information.</description><content:encoded><![CDATA[<p>SuiteCRM 7.10.7 is susceptible to a time-based SQL injection vulnerability (CVE-2019-25664) affecting the <code>record</code> parameter within the <code>Users</code> module&rsquo;s <code>DetailView</code> action. This flaw enables authenticated attackers to inject arbitrary SQL code into database queries by manipulating the <code>record</code> parameter within GET requests directed to the <code>index.php</code> endpoint. By exploiting this vulnerability, attackers can leverage time-based blind SQL injection techniques to extract sensitive database information. This vulnerability poses a significant risk to organizations utilizing vulnerable versions of SuiteCRM as it can lead to unauthorized access to sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the SuiteCRM application.</li>
<li>The attacker crafts a malicious GET request targeting the <code>index.php</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>record</code> parameter of the GET request, specifically targeting the <code>Users</code> module&rsquo;s <code>DetailView</code> action.</li>
<li>The SuiteCRM application processes the crafted request without proper sanitization of the <code>record</code> parameter.</li>
<li>The injected SQL code is executed within the context of the database query.</li>
<li>The attacker leverages time-based SQL injection techniques to infer information about the database structure and content by observing the response times.</li>
<li>Sensitive data is extracted from the database through repeated time-based injection attacks.</li>
<li>The attacker exfiltrates the extracted data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to the unauthorized disclosure of sensitive data stored within the SuiteCRM database. The scope of the impact depends on the level of access granted to the compromised user account, but could include customer data, financial information, or other confidential business data. While there is no count on victims available, all SuiteCRM 7.10.7 installations are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of SuiteCRM that addresses CVE-2019-25664 to remediate the SQL injection vulnerability.</li>
<li>Deploy the Sigma rule provided below to detect exploitation attempts targeting the vulnerable <code>index.php</code> endpoint.</li>
<li>Implement input validation and sanitization measures within the SuiteCRM application to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious GET requests containing potentially malicious SQL code in the <code>record</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2019-25664</category><category>suitecrm</category></item><item><title>SQL Injection Vulnerability in jkev Record Management System 1.0 (CVE-2026-5575)</title><link>https://feed.craftedsignal.io/briefs/2026-04-jkev-sql-injection/</link><pubDate>Sun, 05 Apr 2026 15:16:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-jkev-sql-injection/</guid><description>A SQL injection vulnerability (CVE-2026-5575) exists in the Login component of SourceCodester/jkev Record Management System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the Username parameter in index.php.</description><content:encoded><![CDATA[<p>CVE-2026-5575 is a critical security flaw discovered in SourceCodester/jkev Record Management System version 1.0. Specifically, a SQL injection vulnerability is present within the Login component&rsquo;s index.php file. The vulnerability allows unauthenticated, remote attackers to inject malicious SQL code via the Username parameter. Given that an exploit is publicly available, the risk of exploitation is elevated. This could lead to unauthorized data access, modification, or deletion, potentially compromising the entire Record Management System. Organizations using this software should take immediate action to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of SourceCodester/jkev Record Management System 1.0 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>index.php</code> file associated with the Login component.</li>
<li>Within the HTTP request, the attacker injects SQL code into the <code>Username</code> parameter of the login form.</li>
<li>The application fails to properly sanitize or validate the <code>Username</code> input before incorporating it into an SQL query.</li>
<li>The injected SQL code is executed against the underlying database, potentially bypassing authentication.</li>
<li>The attacker gains unauthorized access to sensitive data stored in the database, such as user credentials or records.</li>
<li>The attacker may modify or delete data, depending on the privileges of the database user account used by the application.</li>
<li>The attacker can potentially pivot to other systems or networks using the compromised database server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5575 can lead to complete compromise of the jkev Record Management System. Attackers can steal sensitive data, modify existing records, or even delete the entire database. This could result in significant financial losses, reputational damage, and legal liabilities. The vulnerable software is used to manage records, so successful attacks could expose confidential customer or business data depending on the nature of the records being managed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detecting JKEV Record Management System SQL Injection Attempt</code> to your SIEM to identify exploitation attempts targeting the vulnerable login page.</li>
<li>Inspect web server logs for requests to <code>/index.php</code> with suspicious characters or SQL keywords in the <code>Username</code> parameter to identify potential attack attempts (see <code>rules</code> section).</li>
<li>Implement input validation and sanitization on the <code>Username</code> parameter in <code>index.php</code> to prevent SQL injection, addressing CVE-2026-5575.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-5575</category><category>web-application</category></item><item><title>code-projects Simple Laundry System 1.0 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-simple-laundry-sql-injection/</link><pubDate>Sun, 05 Apr 2026 13:17:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-simple-laundry-sql-injection/</guid><description>A remote SQL Injection vulnerability exists in code-projects Simple Laundry System 1.0 within the /delmemberinfo.php file's userid parameter, potentially allowing attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>A security vulnerability, CVE-2026-5565, has been identified in code-projects Simple Laundry System version 1.0. This vulnerability is located within the <code>/delmemberinfo.php</code> file, specifically affecting the handling of the <code>userid</code> parameter. Successful exploitation of this flaw allows for SQL injection, enabling a remote attacker to potentially manipulate database queries. Publicly available exploits exist, increasing the risk of widespread exploitation targeting vulnerable installations of the Simple Laundry System 1.0. This could lead to unauthorized data access, modification, or deletion. The vulnerability was reported on April 5, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Simple Laundry System 1.0 instance.</li>
<li>Attacker crafts a malicious HTTP request targeting <code>/delmemberinfo.php</code>.</li>
<li>The crafted request includes a SQL injection payload within the <code>userid</code> parameter.</li>
<li>The application fails to properly sanitize the <code>userid</code> input.</li>
<li>The unsanitized input is passed directly into a SQL query.</li>
<li>The attacker&rsquo;s SQL injection payload is executed by the database server.</li>
<li>The attacker gains the ability to read, modify, or delete data within the database.</li>
<li>The attacker may escalate privileges or pivot to other parts of the system depending on the database configuration and application code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5565 allows attackers to inject arbitrary SQL commands into the Simple Laundry System 1.0 database. This can lead to unauthorized data access, modification, or deletion, potentially compromising sensitive user information, laundry transaction data, and system configurations. A successful attack could result in financial losses, reputational damage, and legal liabilities for affected laundry businesses. While the exact number of vulnerable installations is unknown, the availability of public exploits increases the likelihood of widespread attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious requests to <code>/delmemberinfo.php</code> containing potentially malicious SQL syntax within the <code>userid</code> parameter (reference: Attack Chain).</li>
<li>Deploy the Sigma rule provided below to detect SQL injection attempts targeting the vulnerable endpoint (reference: Sigma rule &ldquo;Detect SQL Injection Attempts to delmemberinfo.php&rdquo;).</li>
<li>Apply input validation and sanitization to the <code>userid</code> parameter in <code>/delmemberinfo.php</code> to prevent SQL injection (reference: CVE-2026-5565).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>SQL Injection Vulnerability in Concert Ticket Reservation System</title><link>https://feed.craftedsignal.io/briefs/2026-04-concert-ticket-sql-injection/</link><pubDate>Sun, 05 Apr 2026 10:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-concert-ticket-sql-injection/</guid><description>A remote attacker can exploit CVE-2026-5554 in code-projects Concert Ticket Reservation System 1.0 to perform SQL injection by manipulating the searching argument in the process_search.php file.</description><content:encoded><![CDATA[<p>CVE-2026-5554 details a SQL injection vulnerability affecting code-projects Concert Ticket Reservation System version 1.0. The vulnerability resides within the <code>/ConcertTicketReservationSystem-master/process_search.php</code> file, specifically in how the Parameter Handler component processes search arguments. A remote attacker can manipulate the <code>searching</code> argument to inject arbitrary SQL commands. Publicly available exploits exist, increasing the risk of active exploitation. Successful exploitation allows the attacker to read, modify, or delete sensitive data within the application&rsquo;s database. This poses a significant threat to the confidentiality, integrity, and availability of the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of Concert Ticket Reservation System 1.0 accessible over the network.</li>
<li>Attacker crafts a malicious SQL injection payload targeting the <code>searching</code> parameter in the <code>/ConcertTicketReservationSystem-master/process_search.php</code> file.</li>
<li>The attacker sends a crafted HTTP request to the vulnerable endpoint, injecting SQL code into the application&rsquo;s database query.</li>
<li>The application executes the attacker-controlled SQL query against its database.</li>
<li>The attacker gains unauthorized access to sensitive data stored in the database, such as user credentials, ticket information, or financial records.</li>
<li>The attacker may modify or delete data, disrupting service and potentially causing financial loss.</li>
<li>The attacker may use the compromised database to pivot to other systems or escalate privileges within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5554 can lead to complete database compromise, potentially affecting all users and transactions within the Concert Ticket Reservation System. The number of affected installations is unknown, but any system running version 1.0 is vulnerable. Attackers can steal user credentials, modify ticket prices, disrupt ticket sales, or even shut down the system entirely, resulting in significant financial and reputational damage for the affected organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates from code-projects to address CVE-2026-5554.</li>
<li>Deploy the Sigma rule <code>Detecting SQL Injection Attempts</code> to detect attempts to exploit the vulnerability via malicious HTTP requests.</li>
<li>Implement input validation and sanitization on all user-supplied input to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious activity related to <code>/ConcertTicketReservationSystem-master/process_search.php</code>, as this is the vulnerable endpoint.</li>
<li>Consider using a web application firewall (WAF) to filter malicious requests targeting the application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>SQL Injection Vulnerability in Free Hotel Reservation System 1.0 (CVE-2026-5551)</title><link>https://feed.craftedsignal.io/briefs/2026-04-free-hotel-sql-injection/</link><pubDate>Sun, 05 Apr 2026 09:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-free-hotel-sql-injection/</guid><description>A SQL injection vulnerability (CVE-2026-5551) exists in itsourcecode Free Hotel Reservation System 1.0, specifically affecting the `email` parameter within the `/hotel/admin/login.php` file, allowing remote attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>itsourcecode Free Hotel Reservation System version 1.0 is vulnerable to SQL injection. The vulnerability, identified as CVE-2026-5551, resides in the <code>/hotel/admin/login.php</code> file within the Parameter Handler component. Publicly available exploits target the <code>email</code> parameter, allowing unauthenticated remote attackers to inject malicious SQL queries. This vulnerability can lead to unauthorized access to sensitive data, modification of the database, or even complete compromise of the affected system. Due to the public availability of exploits, defenders must implement immediate detection and prevention measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an instance of itsourcecode Free Hotel Reservation System 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/hotel/admin/login.php</code> endpoint.</li>
<li>The crafted request includes a SQL injection payload within the <code>email</code> parameter.</li>
<li>The application fails to properly sanitize the <code>email</code> input.</li>
<li>The application executes the attacker-controlled SQL query against the database.</li>
<li>The attacker bypasses authentication by injecting SQL to return valid credentials.</li>
<li>The attacker gains unauthorized administrative access to the system.</li>
<li>The attacker extracts sensitive information from the database, such as user credentials or reservation details, or modifies data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5551 can lead to complete compromise of the vulnerable Free Hotel Reservation System 1.0 instance. This can result in the exposure of sensitive customer data, including personal information and financial details. Attackers could also modify reservation data, disrupt hotel operations, or use the compromised system as a launching point for further attacks within the network. Given the nature of the vulnerability, any hotel or organization using this software is at risk of data breaches and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SQL Injection in Free Hotel Reservation System Login</code> to detect exploitation attempts against <code>/hotel/admin/login.php</code> in web server logs.</li>
<li>Apply input validation and sanitization to the <code>email</code> parameter in <code>/hotel/admin/login.php</code> to prevent SQL injection, mitigating CVE-2026-5551.</li>
<li>Monitor web server logs for suspicious activity and SQL-related keywords in HTTP POST requests to <code>/hotel/admin/login.php</code>.</li>
<li>Implement regular security audits and penetration testing to identify and address potential vulnerabilities in web applications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>Piwigo SQL Injection Vulnerability (CVE-2026-27885)</title><link>https://feed.craftedsignal.io/briefs/2026-04-piwigo-sqli/</link><pubDate>Fri, 03 Apr 2026 22:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-piwigo-sqli/</guid><description>CVE-2026-27885 is a SQL Injection vulnerability in Piwigo before version 16.3.0, affecting the Activity List API endpoint, allowing an authenticated administrator to extract sensitive data.</description><content:encoded><![CDATA[<p>Piwigo is an open-source photo gallery application. A SQL Injection vulnerability, identified as CVE-2026-27885, exists in Piwigo versions prior to 16.3.0. Specifically, the Activity List API endpoint is susceptible. An authenticated administrator, by crafting malicious SQL queries, can exploit this vulnerability to extract sensitive data, including user credentials, email addresses, and all stored content within the Piwigo database. Piwigo versions 16.3.0 and later contain a patch for this vulnerability. This allows attackers to potentially take over the entire Piwigo instance by exploiting the vulnerability and dumping the credentials of other administrators or users. The CVSS v3.1 base score is rated as 7.2 (HIGH).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains administrative access to a Piwigo instance running a version prior to 16.3.0, through either brute-forcing credentials or compromising an existing admin account.</li>
<li>The attacker crafts a malicious SQL query designed to exploit the SQL Injection vulnerability in the Activity List API endpoint.</li>
<li>The attacker sends a request to the vulnerable Activity List API endpoint with the crafted SQL payload embedded within the request parameters.</li>
<li>The Piwigo application processes the request without proper sanitization, executing the malicious SQL query against the database.</li>
<li>The database returns the results of the malicious query, which could include sensitive information such as user credentials, email addresses, and other stored data.</li>
<li>The attacker captures the database response and extracts the sensitive information.</li>
<li>The attacker uses the extracted credentials to elevate privileges or impersonate other users, potentially gaining full control of the Piwigo instance.</li>
<li>The attacker exfiltrates sensitive data, defaces the photo gallery, or performs other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-27885 can lead to complete compromise of a Piwigo instance. An attacker could steal user credentials, modify or delete photos, and potentially use the compromised server as a staging point for further attacks. The number of affected installations is unknown, but any Piwigo instance running a version prior to 16.3.0 is vulnerable if an attacker can get administrative access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Piwigo installations to version 16.3.0 or later to patch CVE-2026-27885.</li>
<li>Monitor web server logs for suspicious requests to the Activity List API endpoint that contain potentially malicious SQL syntax to trigger the rule <code>Detecting SQL Injection Attempts in Piwigo</code>.</li>
<li>Implement strict input validation and sanitization on all user-supplied data to prevent SQL injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>piwigo</category></item><item><title>Piwigo SQL Injection Vulnerability (CVE-2026-27834)</title><link>https://feed.craftedsignal.io/briefs/2026-04-piwigo-sql-injection/</link><pubDate>Fri, 03 Apr 2026 22:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-piwigo-sql-injection/</guid><description>A SQL Injection vulnerability (CVE-2026-27834) exists in Piwigo versions prior to 16.3.0, allowing authenticated administrators to execute arbitrary SQL commands via the pwg.users.getList Web Service API method.</description><content:encoded><![CDATA[<p>Piwigo, an open-source photo gallery application, is vulnerable to SQL injection in versions before 16.3.0. The vulnerability resides in the <code>pwg.users.getList</code> Web Service API method.  Specifically, the <code>filter</code> parameter is directly concatenated into a SQL query without sufficient sanitization. This allows an authenticated administrator to inject and execute arbitrary SQL commands on the Piwigo server.  Successful exploitation could lead to data exfiltration, modification, or complete compromise of the Piwigo instance.  Version 16.3.0 patches this vulnerability. The vulnerability was reported on April 3rd, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated administrator logs into the Piwigo web interface.</li>
<li>The administrator crafts a malicious HTTP POST request to the <code>api.php</code> endpoint, targeting the <code>pwg.users.getList</code> Web Service API method.</li>
<li>The malicious request includes the <code>filter</code> parameter containing a SQL injection payload. The payload is designed to exploit the lack of sanitization.</li>
<li>The Piwigo application receives the request and processes the <code>pwg.users.getList</code> API call.</li>
<li>The application concatenates the attacker-controlled <code>filter</code> parameter directly into a SQL query without proper escaping or sanitization.</li>
<li>The crafted SQL query is executed against the Piwigo database.</li>
<li>The injected SQL code performs unauthorized actions, such as extracting sensitive data, modifying database records, or executing system commands via SQL.</li>
<li>The attacker retrieves the results of the injected SQL query from the HTTP response.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-27834) in Piwigo versions before 16.3.0 can lead to complete compromise of the Piwigo installation. An attacker could potentially access sensitive data such as user credentials, private photos, and system configuration information. The attacker could also modify or delete data, disrupt service, or potentially gain unauthorized access to the underlying server. Given the administrator privilege required for exploitation, the impact is considered significant within the vulnerable Piwigo instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Piwigo to version 16.3.0 or later to patch CVE-2026-27834 (see references).</li>
<li>Deploy the provided Sigma rule to detect exploitation attempts against the <code>pwg.users.getList</code> API endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to <code>api.php</code> containing unusual characters or SQL keywords in the <code>filter</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>piwigo</category><category>sql-injection</category><category>cve-2026-27834</category></item><item><title>SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-04-online-enrollment-sql-injection/</link><pubDate>Thu, 02 Apr 2026 14:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-online-enrollment-sql-injection/</guid><description>A SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component at /enrollment/index.php, where manipulating the deptid argument can lead to remote code execution, with public exploits available.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in itsourcecode Online Enrollment System version 1.0. The vulnerability resides within the Parameter Handler component of the application, specifically affecting the <code>/enrollment/index.php</code> endpoint. By manipulating the <code>deptid</code> argument, a remote attacker can inject malicious SQL queries, potentially leading to unauthorized data access, modification, or even remote code execution. This vulnerability is particularly concerning because a public exploit is available, increasing the likelihood of active exploitation. Defenders should prioritize patching or mitigating this vulnerability to prevent potential compromise of their systems. The scope of impact includes any system running the vulnerable version of itsourcecode Online Enrollment System.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of itsourcecode Online Enrollment System 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/enrollment/index.php?view=edit&amp;id=3</code>.</li>
<li>The attacker injects SQL code into the <code>deptid</code> parameter of the HTTP request.</li>
<li>The web server processes the request and passes the tainted <code>deptid</code> parameter to the SQL query.</li>
<li>The injected SQL code is executed against the database, allowing the attacker to bypass authentication or access sensitive data.</li>
<li>The attacker may escalate the attack by attempting to execute arbitrary commands on the server.</li>
<li>Successful exploitation allows the attacker to dump database contents, modify enrollment records, or gain administrative access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to complete compromise of the Online Enrollment System. This includes unauthorized access to sensitive student data, modification of enrollment records, and potentially remote code execution on the server. Given that a public exploit exists, organizations using the vulnerable software are at high risk of experiencing data breaches, financial losses, and reputational damage. The potential victim count depends on the number of installations of the affected Online Enrollment System.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious POST requests to <code>/enrollment/index.php</code> containing potentially malicious SQL syntax within the <code>deptid</code> parameter to identify potential exploitation attempts.</li>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempt via deptid Parameter</code> to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Block requests to <code>/enrollment/index.php?view=edit&amp;id=3</code> containing SQL keywords in the <code>deptid</code> parameter at the WAF or reverse proxy.</li>
<li>Apply input validation and sanitization to the <code>deptid</code> parameter within the application code to prevent SQL injection attacks in the future.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sql-injection</category><category>web-application</category><category>cve-2026-5334</category></item><item><title>Unauthenticated SQL Injection Vulnerability in mb24api Endpoint (CVE-2026-33616)</title><link>https://feed.craftedsignal.io/briefs/2026-04-sql-injection-mb24api/</link><pubDate>Thu, 02 Apr 2026 10:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sql-injection-mb24api/</guid><description>CVE-2026-33616 describes an unauthenticated blind SQL Injection vulnerability affecting an mb24api endpoint, which a remote attacker can exploit by injecting special elements into a SQL SELECT command, potentially leading to a total loss of confidentiality due to improper neutralization of special elements.</description><content:encoded><![CDATA[<p>CVE-2026-33616 identifies a critical security flaw affecting the mb24api endpoint, stemming from an unauthenticated blind SQL Injection vulnerability. The root cause lies in the improper neutralization of special elements within a SQL SELECT command. This vulnerability poses a significant threat, as it allows an unauthenticated remote attacker to inject malicious SQL code. Successful exploitation can result in complete compromise of data confidentiality. Defenders need to be aware of the potential for unauthorized data access and manipulation due to this vulnerability and should prioritize patching or implementing compensating controls. The affected product and version are not specified in the source document.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the vulnerable mb24api endpoint.</li>
<li>The attacker crafts a malicious HTTP request containing SQL injection payloads within the URL parameters or request body.</li>
<li>The vulnerable mb24api endpoint processes the HTTP request and incorporates the attacker&rsquo;s SQL injection payload into a SQL SELECT query without proper sanitization.</li>
<li>The injected SQL code is executed against the backend database.</li>
<li>Due to the blind SQL injection nature, the attacker infers database structure and data by observing the application&rsquo;s response times or error messages triggered by the injected SQL code.</li>
<li>The attacker extracts sensitive information, such as usernames, passwords, or customer data, by using SQL injection techniques like <code>UNION SELECT</code> or boolean-based blind SQL injection.</li>
<li>The attacker gains unauthorized access to the application&rsquo;s data.</li>
<li>The attacker exfiltrates the stolen data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33616 can lead to a total loss of data confidentiality. An attacker can gain unauthorized access to sensitive information stored in the database, including user credentials, personal data, and proprietary business information. The impact of this vulnerability is high, as it can result in significant financial losses, reputational damage, and legal liabilities for the affected organization. The number of potential victims is unknown, but could be significant depending on the scope and user base of the affected application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates provided by the vendor to address CVE-2026-33616.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection attacks, focusing on the mb24api endpoint.</li>
<li>Deploy a web application firewall (WAF) with rules to detect and block SQL injection attempts targeting the mb24api endpoint.</li>
<li>Monitor web server logs for suspicious activity, such as unusual HTTP requests or SQL syntax in request parameters and enable <code>webserver</code> and <code>proxy</code> logs.</li>
<li>Implement the provided Sigma rule to detect potential SQL injection attempts in web server logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-33616</category><category>web-application</category></item><item><title>Unauthenticated SQL Injection Vulnerability in setinfo Endpoint</title><link>https://feed.craftedsignal.io/briefs/2026-04-sql-injection-setinfo/</link><pubDate>Thu, 02 Apr 2026 10:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sql-injection-setinfo/</guid><description>An unauthenticated remote attacker can exploit a SQL Injection vulnerability (CVE-2026-33615) in the setinfo endpoint by injecting malicious code into a SQL UPDATE command, leading to a total loss of integrity and availability.</description><content:encoded><![CDATA[<p>CVE-2026-33615 describes a critical security vulnerability affecting the <code>setinfo</code> endpoint. This vulnerability allows an unauthenticated remote attacker to inject malicious SQL code due to the improper neutralization of special elements within a SQL UPDATE command. The vulnerability was published on April 2, 2026. Successful exploitation can lead to complete data compromise, system downtime, and a total loss of integrity and availability. This vulnerability poses a significant risk to organizations utilizing the affected <code>setinfo</code> endpoint.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the vulnerable <code>setinfo</code> endpoint, which is accessible without authentication.</li>
<li>The attacker crafts a malicious HTTP request containing SQL injection payloads within the parameters intended for the <code>setinfo</code> function.</li>
<li>The application fails to properly sanitize or validate the input, allowing the SQL injection payload to be passed directly to the database.</li>
<li>The injected SQL code is executed within the context of the SQL UPDATE command, potentially modifying sensitive data.</li>
<li>The attacker leverages the SQL injection to escalate privileges or gain access to other parts of the database.</li>
<li>The attacker may exfiltrate sensitive information or modify database records to cause a denial of service.</li>
<li>The attacker can potentially overwrite critical data, leading to a total loss of integrity.</li>
<li>The attacker may use the compromised system as a pivot point to attack other internal systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-33615) can lead to a total loss of data integrity and system availability. This could result in significant financial losses, reputational damage, and disruption of critical services. Since the vulnerability is unauthenticated, any attacker on the network can potentially exploit it, leading to widespread compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for unusual requests to the <code>setinfo</code> endpoint containing SQL syntax to identify potential exploitation attempts (Log source: webserver).</li>
<li>Monitor database logs for SQL UPDATE commands originating from the application that contain suspicious or unexpected syntax to detect potential SQL injection (Log source: database).</li>
<li>Implement input validation and sanitization measures to neutralize special elements in SQL commands to prevent future exploitation of SQL injection vulnerabilities.</li>
<li>Deploy the Sigma rule &ldquo;Detect Potential SQL Injection in setinfo Endpoint&rdquo; to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>vulnerability</category><category>web-application</category></item><item><title>Unauthenticated SQL Injection Vulnerability in getinfo Endpoint (CVE-2026-33614)</title><link>https://feed.craftedsignal.io/briefs/2026-04-sql-injection-getinfo/</link><pubDate>Thu, 02 Apr 2026 10:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sql-injection-getinfo/</guid><description>An unauthenticated SQL Injection vulnerability (CVE-2026-33614) in the getinfo endpoint allows a remote attacker to execute arbitrary SQL commands due to improper neutralization of special elements, potentially leading to a total loss of confidentiality.</description><content:encoded><![CDATA[<p>CVE-2026-33614 describes an unauthenticated SQL Injection vulnerability present in the getinfo endpoint of an unspecified application. Discovered and reported by CERT VDE, the vulnerability stems from the improper neutralization of special elements within a SQL SELECT command. A remote, unauthenticated attacker can exploit this flaw to inject malicious SQL code, potentially gaining unauthorized access to sensitive data. Successful exploitation results in a total loss of confidentiality, as the attacker can retrieve any information stored in the database. The scope of affected products is currently unknown, highlighting the need for further investigation and patching by vendors who utilize similar getinfo endpoints and SQL queries. This vulnerability poses a significant risk as it requires no authentication, making it easily exploitable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable getinfo endpoint that accepts user-supplied input.</li>
<li>Attacker crafts a malicious SQL injection payload, embedding it within a seemingly benign request to the getinfo endpoint.</li>
<li>The application fails to properly sanitize or validate the attacker&rsquo;s input.</li>
<li>The unsanitized input is directly incorporated into a SQL SELECT query executed by the application.</li>
<li>The injected SQL code modifies the original query, potentially bypassing security measures and accessing sensitive data.</li>
<li>The database executes the modified SQL query, treating the injected code as legitimate commands.</li>
<li>The application retrieves the results of the injected query, which may include sensitive data such as usernames, passwords, or financial information.</li>
<li>The attacker receives the leaked data in the response from the getinfo endpoint, completing the data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33614 leads to a total loss of confidentiality. Attackers can potentially access and exfiltrate sensitive data stored in the application&rsquo;s database, including user credentials, financial records, and other confidential information. The number of potential victims is unknown, as the affected product is not specified in the CVE. However, any application utilizing a vulnerable getinfo endpoint is at risk. The impact includes data breaches, identity theft, financial fraud, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious requests to <code>getinfo</code> endpoints containing SQL syntax (e.g., <code>SELECT</code>, <code>UNION</code>, <code>OR</code>) to identify potential exploitation attempts. Use the provided Sigma rule <code>Detect Suspicious getinfo SQL Injection Attempts</code> for this purpose.</li>
<li>Implement input validation and sanitization on all user-supplied input to the <code>getinfo</code> endpoint to prevent SQL injection attacks.</li>
<li>Deploy parameterized queries or prepared statements to ensure that user input is treated as data, not executable code.</li>
<li>Monitor database logs for anomalous SQL queries originating from the application server to detect potential SQL injection activity.</li>
<li>Apply the principle of least privilege to database accounts used by the application, limiting their access to only the necessary data.</li>
<li>Conduct regular security audits and penetration testing to identify and address potential vulnerabilities, including SQL injection flaws.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>vulnerability</category><category>web-application</category></item><item><title>AlejandroArciniegas mcp-data-vis SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-mcp-sql-injection/</link><pubDate>Thu, 02 Apr 2026 06:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mcp-sql-injection/</guid><description>A SQL injection vulnerability exists in the MCP Handler component of AlejandroArciniegas mcp-data-vis, specifically in the Request function of src/servers/database/server.js, allowing remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in AlejandroArciniegas&rsquo;s mcp-data-vis project, affecting the MCP Handler component. The vulnerability resides within the <code>Request</code> function of the <code>src/servers/database/server.js</code> file. This flaw allows a remote attacker to inject arbitrary SQL commands through manipulation of input parameters. Public exploit code is available, increasing the risk of exploitation. Due to the software&rsquo;s rolling release model, identifying specific vulnerable versions is challenging. The vendor was notified but did not respond to the disclosure, potentially delaying remediation efforts and increasing the window of opportunity for malicious actors to exploit this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a publicly accessible instance of mcp-data-vis.</li>
<li>The attacker analyzes the <code>src/servers/database/server.js</code> file to understand the structure of the <code>Request</code> function.</li>
<li>The attacker crafts a malicious SQL injection payload targeting the <code>Request</code> function.</li>
<li>The attacker sends a specially crafted HTTP request containing the SQL injection payload to the vulnerable endpoint.</li>
<li>The vulnerable <code>Request</code> function processes the malicious SQL query without proper sanitization.</li>
<li>The injected SQL code is executed against the backend database, potentially allowing data extraction.</li>
<li>The attacker retrieves sensitive data from the database, such as user credentials or application configuration.</li>
<li>The attacker could potentially use the compromised database to pivot to other systems within the network, or deface the web application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to unauthorized access to sensitive data, including user credentials and application configurations. The lack of versioning information due to the rolling release model makes it difficult to identify and patch vulnerable instances. Organizations using mcp-data-vis are at risk of data breaches, service disruption, and potential compromise of their entire infrastructure if this vulnerability is exploited. Given the public availability of exploit code, the likelihood of exploitation is high, particularly for unpatched systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect and sanitize all user-provided input passed to the <code>Request</code> function in <code>src/servers/database/server.js</code> within the mcp-data-vis application to prevent SQL injection.</li>
<li>Deploy the provided Sigma rule to detect suspicious network activity indicative of SQL injection attempts targeting the <code>Request</code> function.</li>
<li>Monitor web server logs for suspicious HTTP requests containing potentially malicious SQL syntax related to CVE-2026-5322.</li>
<li>Implement a Web Application Firewall (WAF) with rules to block common SQL injection payloads targeting the mcp-data-vis application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-5322</category></item><item><title>pandas-ai SQL Injection Vulnerability (CVE-2026-30273)</title><link>https://feed.craftedsignal.io/briefs/2026-04-pandas-ai-sql-injection/</link><pubDate>Wed, 01 Apr 2026 17:28:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pandas-ai-sql-injection/</guid><description>pandas-ai v3.0.0 is vulnerable to SQL injection via the pandasai.agent.base._execute_sql_query component, potentially allowing unauthorized database access and modification.</description><content:encoded><![CDATA[<p>pandas-ai v3.0.0 contains a SQL injection vulnerability in the <code>pandasai.agent.base._execute_sql_query</code> component. This flaw, identified as CVE-2026-30273, could allow an attacker to inject malicious SQL code into queries executed by the application. Successful exploitation can lead to unauthorized data access, modification, or deletion within the underlying database. Given the nature of pandas-ai as a tool intended to work with data, this vulnerability poses a significant risk to data integrity and confidentiality. The affected version is pandas-ai v3.0.0, and users of this version should take immediate action to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a publicly accessible endpoint in the pandas-ai application that leverages the vulnerable <code>_execute_sql_query</code> function.</li>
<li>The attacker crafts a malicious SQL query string containing SQL injection payloads.</li>
<li>This malicious SQL query is submitted to the vulnerable endpoint, often as part of user-supplied input.</li>
<li>The pandas-ai application passes the tainted SQL query to the <code>_execute_sql_query</code> function without proper sanitization or parameterization.</li>
<li>The <code>_execute_sql_query</code> function executes the injected SQL command directly against the database.</li>
<li>The attacker gains unauthorized access to sensitive data stored in the database.</li>
<li>The attacker may modify or delete data, escalate privileges, or potentially execute arbitrary code on the database server, depending on database permissions and configuration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-30273) can result in unauthorized access to sensitive data, data modification or deletion, and potential compromise of the underlying database server. The impact depends on the permissions granted to the database user the pandas-ai application uses. This vulnerability could affect any organization using pandas-ai v3.0.0 to interact with SQL databases, potentially leading to data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of pandas-ai that addresses CVE-2026-30273. Check the pandas-ai GitHub repository for updates (<a href="https://github.com/sinaptik-ai/pandas-ai)">https://github.com/sinaptik-ai/pandas-ai)</a>.</li>
<li>Implement robust input validation and sanitization measures to prevent SQL injection attacks. Specifically, focus on sanitizing any input passed to the <code>pandasai.agent.base._execute_sql_query</code> function.</li>
<li>Deploy the Sigma rule <code>Detecting_Potential_PandasAI_SQL_Injection_Attempts</code> to identify potential exploitation attempts within web server logs.</li>
<li>Regularly audit and review the application&rsquo;s code to identify and remediate potential security vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>vulnerability</category><category>pandas-ai</category></item><item><title>Django Multiple Vulnerabilities Leading to SQL Injection, Information Disclosure, and DoS</title><link>https://feed.craftedsignal.io/briefs/2026-04-django-vulns/</link><pubDate>Wed, 01 Apr 2026 09:20:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-django-vulns/</guid><description>A remote, authenticated attacker can exploit multiple vulnerabilities in Django to perform SQL injections, disclose confidential information, or cause a denial-of-service condition.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in the Django web framework that could allow a remote, authenticated attacker to perform SQL injection attacks, disclose sensitive information, or cause a denial-of-service (DoS) condition. This vulnerability impacts Django-based applications, potentially exposing sensitive data and disrupting services. Defenders need to prioritize detection and mitigation strategies to prevent exploitation of these weaknesses. Specific Django versions affected are not detailed in the source, requiring a broad approach to detection across Django deployments. The lack of specific CVEs makes targeted patching difficult, emphasizing the importance of proactive monitoring for exploitation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials to a Django-based web application through credential stuffing or other means.</li>
<li>The attacker identifies input fields within the application that are vulnerable to SQL injection, such as search boxes or form fields that directly interact with the database.</li>
<li>The attacker crafts malicious SQL queries using techniques like SQL injection within these vulnerable input fields.</li>
<li>The Django application, without proper input sanitization, executes the attacker-controlled SQL query against the underlying database.</li>
<li>Depending on the specific vulnerability and database permissions, the attacker may extract sensitive data, such as user credentials, financial information, or internal application data.</li>
<li>The attacker may also modify database records to escalate privileges or manipulate application behavior.</li>
<li>By exploiting vulnerabilities that cause excessive resource consumption, the attacker can trigger a denial-of-service condition, rendering the application unavailable to legitimate users.</li>
<li>The attacker exfiltrates the gathered information or uses the compromised application for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these Django vulnerabilities can lead to significant data breaches, compromising sensitive user data and intellectual property. Affected organizations could face financial losses due to regulatory fines, legal liabilities, and reputational damage. A denial-of-service condition can disrupt business operations and damage customer trust. The number of affected organizations is potentially large, given the widespread use of the Django framework in web application development.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule to detect potential SQL injection attempts targeting Django applications, focusing on <code>webserver</code> logs and HTTP request parameters.</li>
<li>Implement strong input validation and sanitization measures within Django applications to prevent SQL injection vulnerabilities (reference: overview).</li>
<li>Monitor web server logs for unusual activity patterns, such as large numbers of requests from a single IP address, which could indicate a denial-of-service attack (reference: attack chain step 7).</li>
<li>Regularly audit Django applications for security vulnerabilities and apply necessary patches and updates (reference: overview).</li>
<li>Consider using a web application firewall (WAF) to filter out malicious requests and protect against common web application attacks (reference: overview).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>django</category><category>sql-injection</category><category>information-disclosure</category><category>denial-of-service</category><category>web-application</category><category>webserver</category></item><item><title>itsourcecode Payroll Management System 1.0 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-payroll-sql-injection/</link><pubDate>Wed, 01 Apr 2026 00:16:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-payroll-sql-injection/</guid><description>itsourcecode Payroll Management System 1.0 is vulnerable to SQL injection via the ID parameter in /view_employee.php, allowing remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>itsourcecode Payroll Management System 1.0 is vulnerable to SQL injection in the <code>/view_employee.php</code> script. This vulnerability, identified as CVE-2026-5238, allows a remote attacker to inject arbitrary SQL commands by manipulating the <code>ID</code> parameter. Publicly available exploits exist, increasing the risk of exploitation. Successful exploitation could lead to unauthorized data access, modification, or deletion within the payroll database. This poses a significant threat to organizations using the affected software, potentially compromising sensitive employee information. Defenders need to implement immediate mitigation strategies to prevent potential attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of itsourcecode Payroll Management System 1.0.</li>
<li>Attacker crafts a malicious SQL injection payload targeting the <code>ID</code> parameter in the <code>/view_employee.php</code> file.</li>
<li>The attacker sends an HTTP GET or POST request to <code>/view_employee.php</code> with the crafted SQL injection payload in the <code>ID</code> parameter (e.g., <code>/view_employee.php?ID=1' UNION SELECT ...</code>).</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL query to the database.</li>
<li>The database executes the injected SQL command, potentially returning sensitive data or allowing data modification.</li>
<li>The attacker retrieves sensitive data from the database, such as employee usernames, passwords, social security numbers, and salary information.</li>
<li>The attacker may further escalate the attack by modifying or deleting data within the payroll system.</li>
<li>The attacker achieves complete control over the payroll database, potentially leading to financial fraud or data breaches.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows attackers to access and manipulate sensitive payroll data. This could lead to data breaches, financial fraud, and reputational damage. The impact includes unauthorized access to employee personal information, modification of payroll records, and potential theft of funds. Given the public availability of exploits, organizations using itsourcecode Payroll Management System 1.0 are at immediate risk. The vulnerability could impact any organization using this software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious requests to <code>/view_employee.php</code> containing SQL syntax in the <code>ID</code> parameter and deploy the Sigma rule.</li>
<li>Apply input validation and sanitization to the <code>ID</code> parameter in <code>/view_employee.php</code> to prevent SQL injection, as indicated by CVE-2026-5238.</li>
<li>Monitor network traffic for unusual database activity originating from the web server and deploy the Sigma rule.</li>
<li>Deploy the provided Sigma rule to detect exploitation attempts and tune it to your environment.</li>
<li>Apply web application firewall (WAF) rules to block known SQL injection attack patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>payroll-system</category></item><item><title>SQL Injection Vulnerability in itsourcecode Payroll Management System 1.0 (CVE-2026-5237)</title><link>https://feed.craftedsignal.io/briefs/2026-03-payroll-sqli/</link><pubDate>Tue, 31 Mar 2026 23:17:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-payroll-sqli/</guid><description>A SQL injection vulnerability (CVE-2026-5237) exists in itsourcecode Payroll Management System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID parameter in the /manage_user.php file.</description><content:encoded><![CDATA[<p>itsourcecode Payroll Management System 1.0 is vulnerable to SQL injection, specifically within the <code>/manage_user.php</code> file. The vulnerability, identified as CVE-2026-5237, stems from improper sanitization of the <code>ID</code> parameter. A remote attacker can exploit this flaw to inject arbitrary SQL commands into the application&rsquo;s database queries. Publicly available exploit code exists, increasing the risk of exploitation. This vulnerability allows attackers to potentially compromise the entire database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of itsourcecode Payroll Management System 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/manage_user.php</code> file.</li>
<li>The attacker injects SQL code into the <code>ID</code> parameter within the crafted HTTP request.</li>
<li>The web server passes the tainted <code>ID</code> parameter to the vulnerable SQL query without proper sanitization.</li>
<li>The injected SQL code is executed against the database.</li>
<li>The attacker gains unauthorized access to sensitive data within the database, such as user credentials or payroll information.</li>
<li>The attacker can modify or delete data within the database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to the complete compromise of the itsourcecode Payroll Management System 1.0 database. An attacker could potentially gain access to sensitive payroll data, including employee names, addresses, social security numbers, and financial information. This data could be used for identity theft, financial fraud, or other malicious purposes. The vulnerability also allows for data modification or deletion, potentially disrupting payroll operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for requests to <code>/manage_user.php</code> containing suspicious characters or SQL keywords in the <code>ID</code> parameter to detect potential exploitation attempts (see rule: &ldquo;Detect SQL Injection Attempts via URI&rdquo;).</li>
<li>Monitor web server error logs for SQL errors that may indicate successful or attempted SQL injection (see rule: &ldquo;Detect SQL Errors&rdquo;).</li>
<li>Apply appropriate input validation and sanitization techniques to the <code>ID</code> parameter in the <code>/manage_user.php</code> file to prevent SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>payroll-system</category></item><item><title>SQL Injection Vulnerability in Student Membership System 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-03-student-membership-sql-injection/</link><pubDate>Tue, 31 Mar 2026 12:16:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-student-membership-sql-injection/</guid><description>CVE-2026-5198 is a SQL injection vulnerability in the Admin Login component of code-projects Student Membership System 1.0, affecting the /admin/index.php file, enabling remote exploitation through manipulation of username/password parameters.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-5198, exists within the code-projects Student Membership System version 1.0. Specifically, the vulnerability lies within the Admin Login component&rsquo;s <code>/admin/index.php</code> file. Attackers can remotely exploit this vulnerability by manipulating the <code>username</code> and <code>password</code> parameters, leading to arbitrary SQL command execution. Public exploit code is available, increasing the risk of widespread exploitation. This vulnerability poses a…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>vulnerability</category><category>web-application</category></item><item><title>code-projects Student Membership System SQL Injection Vulnerability (CVE-2026-5195)</title><link>https://feed.craftedsignal.io/briefs/2026-04-student-membership-sql-injection/</link><pubDate>Tue, 31 Mar 2026 09:18:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-student-membership-sql-injection/</guid><description>A remote SQL injection vulnerability exists in the User Registration Handler component of code-projects Student Membership System 1.0, exploitable through manipulation of input.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-5195, has been discovered in code-projects Student Membership System version 1.0. The vulnerability specifically affects the &ldquo;User Registration Handler&rdquo; component. An attacker can remotely exploit this flaw by manipulating input to execute arbitrary SQL queries. This vulnerability could allow an attacker to read, modify, or delete sensitive data within the application&rsquo;s database. The base CVSS v3.1 score is 7.3, indicating a high severity…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-5195</category></item><item><title>SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5180)</title><link>https://feed.craftedsignal.io/briefs/2026-03-simple-doctors-sqli/</link><pubDate>Tue, 31 Mar 2026 05:16:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-simple-doctors-sqli/</guid><description>A SQL Injection vulnerability (CVE-2026-5180) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'email' parameter in the /admin/ajax.php?action=login2 endpoint.</description><content:encoded><![CDATA[<p>SourceCodester Simple Doctors Appointment System 1.0 is vulnerable to SQL Injection (CVE-2026-5180). The vulnerability is located in the <code>/admin/ajax.php?action=login2</code> endpoint, specifically the <code>email</code> parameter. A remote attacker can inject arbitrary SQL commands by manipulating this parameter. The vulnerability has been confirmed and an exploit is publicly available, increasing the risk of widespread exploitation. Successful exploitation can lead to unauthorized data access, modification…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>vulnerability</category><category>web-application</category></item><item><title>SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5179)</title><link>https://feed.craftedsignal.io/briefs/2026-03-simple-doctors-sql-injection/</link><pubDate>Tue, 31 Mar 2026 05:16:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-simple-doctors-sql-injection/</guid><description>A SQL injection vulnerability (CVE-2026-5179) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the Username argument in the /admin/login.php file, with a public exploit available.</description><content:encoded>&lt;p>SourceCodester Simple Doctors Appointment System 1.0 is vulnerable to SQL injection. The vulnerability, identified as CVE-2026-5179, resides in the /admin/login.php file. An attacker can remotely exploit this vulnerability by manipulating the Username argument, injecting malicious SQL commands into the application&amp;rsquo;s database queries. The vulnerability was published on March 31, 2026, and a public exploit is available, increasing the risk of exploitation. This vulnerability could allow attackers…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>SciTokens KeyCache SQL Injection Vulnerability (CVE-2026-32714)</title><link>https://feed.craftedsignal.io/briefs/2026-03-scitokens-sqli/</link><pubDate>Tue, 31 Mar 2026 03:15:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-scitokens-sqli/</guid><description>A SQL injection vulnerability exists in SciTokens versions before 1.9.6, allowing attackers to execute arbitrary SQL commands via the KeyCache class by manipulating user-supplied data used in SQL query construction.</description><content:encoded><![CDATA[<p>SciTokens is a reference library for generating and using SciTokens. A critical SQL injection vulnerability, identified as CVE-2026-32714, affects SciTokens versions prior to 1.9.6. The vulnerability resides within the <code>KeyCache</code> class, which improperly utilizes Python&rsquo;s <code>str.format()</code> to construct SQL queries. This allows an attacker to inject arbitrary SQL commands by manipulating user-supplied data, such as the <code>issuer</code> and <code>key_id</code> parameters, during interactions with the local SQLite…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>scitokens</category><category>cve-2026-32714</category><category>web-application</category></item><item><title>SQL Injection Vulnerability in code-projects Accounting System 1.0 (CVE-2026-5150)</title><link>https://feed.craftedsignal.io/briefs/2026-03-code-projects-sql-injection/</link><pubDate>Mon, 30 Mar 2026 20:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-code-projects-sql-injection/</guid><description>A remote SQL injection vulnerability (CVE-2026-5150) exists in code-projects Accounting System 1.0 via manipulation of the 'cos_id' argument in /viewin_costumer.php, potentially allowing attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>A critical security vulnerability, identified as CVE-2026-5150, has been discovered in code-projects Accounting System version 1.0. The vulnerability resides within the Parameter Handler component, specifically affecting the &lsquo;/viewin_costumer.php&rsquo; file.  By maliciously manipulating the &lsquo;cos_id&rsquo; argument, a remote attacker can inject arbitrary SQL commands into the application&rsquo;s database queries.  Given the public disclosure of this exploit, the risk of exploitation is elevated.  Successful…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-5150</category></item><item><title>YunaiV yudao-cloud SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-yudao-sql-injection/</link><pubDate>Mon, 30 Mar 2026 19:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-yudao-sql-injection/</guid><description>A remote SQL injection vulnerability (CVE-2026-5147) exists in YunaiV yudao-cloud up to version 2026.01 via the Website argument in the /admin-api/system/tenant/get-by-website endpoint, allowing unauthenticated attackers to potentially execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>A security flaw, identified as CVE-2026-5147, has been discovered in YunaiV yudao-cloud software, specifically versions up to 2026.01. The vulnerability resides in the <code>/admin-api/system/tenant/get-by-website</code> endpoint, where manipulation of the <code>Website</code> argument can lead to SQL injection. This allows for potential remote exploitation without requiring authentication. The vulnerability was reported to the vendor, but no response or patch has been provided. Publicly available exploit code…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-5147</category><category>sql-injection</category><category>web-application</category></item><item><title>Multiple Vulnerabilities in Fleet</title><link>https://feed.craftedsignal.io/briefs/2026-03-fleet-vulns/</link><pubDate>Mon, 30 Mar 2026 11:08:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-fleet-vulns/</guid><description>Multiple vulnerabilities in Fleet allow an attacker to perform SQL injection, denial of service, bypass security measures, disclose information, and execute arbitrary program code with administrator privileges.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in Fleet, a device management platform. These vulnerabilities, if exploited, could allow an attacker to perform a range of malicious activities, including SQL injection attacks, denial-of-service (DoS) attacks, bypassing security measures, disclosing sensitive information, and ultimately executing arbitrary program code with administrator privileges. Successful exploitation poses a significant risk to the confidentiality, integrity, and availability of systems managed by Fleet. Defenders should prioritize patching and implementing detection measures to mitigate the risk associated with these vulnerabilities. This threat affects all versions of Fleet.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable endpoint in the Fleet application susceptible to SQL injection.</li>
<li>The attacker crafts a malicious SQL query designed to extract sensitive data from the Fleet database.</li>
<li>The attacker injects the malicious SQL query into the vulnerable endpoint, bypassing input validation.</li>
<li>The Fleet application executes the injected SQL query, inadvertently disclosing sensitive information such as user credentials and system configurations.</li>
<li>Alternatively, the attacker crafts a different SQL injection payload to modify database records, potentially granting themselves administrative privileges.</li>
<li>With elevated privileges, the attacker uploads and executes a malicious payload on the Fleet server.</li>
<li>The attacker leverages their access to install persistent backdoors and expand their reach within the network.</li>
<li>The attacker uses their foothold to disrupt the normal operations of the Fleet server causing a denial-of-service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can have severe consequences. An attacker could gain complete control over the Fleet server, leading to data breaches, system outages, and the compromise of managed devices. The impact includes potential loss of sensitive data, disruption of critical services, and reputational damage. The attacker&rsquo;s ability to execute arbitrary code with administrator privileges allows them to perform virtually any action on the affected system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Fleet Processes</code> to identify potentially malicious processes spawned by Fleet.</li>
<li>Inspect web server logs for SQL injection attempts targeting the Fleet application using the <code>Detect Fleet SQL Injection Attempts</code> Sigma rule.</li>
<li>Monitor network connections originating from Fleet servers for unusual activity, especially outbound connections to unexpected destinations.</li>
<li>Implement strict input validation and sanitization measures to prevent SQL injection attacks, addressing the vulnerability at its root.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>fleet</category><category>vulnerability</category><category>sql-injection</category><category>denial-of-service</category></item><item><title>Multiple Vulnerabilities in Dovecot Mail Server</title><link>https://feed.craftedsignal.io/briefs/2026-03-dovecot-vulns/</link><pubDate>Mon, 30 Mar 2026 10:14:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-dovecot-vulns/</guid><description>Multiple vulnerabilities in Dovecot can be exploited by an attacker to perform SQL injection attacks, bypass authentication, disclose sensitive information, or cause a denial-of-service condition.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in the Dovecot mail server software. An attacker can leverage these flaws to execute SQL injection attacks, potentially gaining unauthorized access to the underlying database. Furthermore, successful exploitation could lead to bypassing authentication mechanisms, allowing unauthorized access to mailboxes and sensitive information. The vulnerabilities also pose a risk of sensitive information disclosure and denial-of-service (DoS) conditions, disrupting mail services. The broad functionality affected by these flaws makes it a high-priority issue for organizations using Dovecot.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Dovecot instance accessible over the network.</li>
<li>The attacker crafts a malicious input string designed to exploit a SQL injection vulnerability in Dovecot&rsquo;s authentication or user management modules.</li>
<li>The attacker submits the crafted input to a Dovecot service, such as IMAP or POP3, during the authentication process.</li>
<li>If the SQL injection is successful, the attacker gains unauthorized access to the Dovecot database.</li>
<li>The attacker uses the database access to extract user credentials or modify authentication settings.</li>
<li>Alternatively, the attacker exploits the SQL injection to disclose sensitive configuration data or internal system information.</li>
<li>If authentication bypass is successful, the attacker logs into a targeted user&rsquo;s mailbox without valid credentials.</li>
<li>The attacker causes a denial-of-service condition by sending malformed requests that crash the Dovecot server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to complete compromise of the Dovecot server and the data it manages. This includes unauthorized access to user mailboxes, disclosure of sensitive information, and disruption of email services. The impact ranges from data breaches and loss of confidentiality to service outages and reputational damage. The severity depends on the specific vulnerability exploited and the configuration of the Dovecot instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Closely monitor Dovecot logs for suspicious SQL-related errors or authentication failures (reference: description of SQL injection vulnerability).</li>
<li>Implement strict input validation and sanitization measures to mitigate potential SQL injection attacks within Dovecot configurations.</li>
<li>Since the advisory does not list specific log sources, enable verbose logging for Dovecot services to capture detailed information about authentication attempts and database interactions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dovecot</category><category>vulnerability</category><category>sql-injection</category><category>authentication-bypass</category><category>dos</category></item><item><title>SQL Injection Vulnerability in Simple Food Order System 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-03-simple-food-sqli/</link><pubDate>Sat, 28 Mar 2026 23:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-simple-food-sqli/</guid><description>A SQL injection vulnerability exists in code-projects Simple Food Order System 1.0 within the register-router.php file, where manipulation of the Name argument can lead to remote code execution.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in the code-projects Simple Food Order System version 1.0. The vulnerability resides within the <code>register-router.php</code> file, specifically affecting the handling of the &lsquo;Name&rsquo; argument. An attacker can remotely exploit this weakness by manipulating the &lsquo;Name&rsquo; parameter, leading to arbitrary SQL execution. Given the public availability of exploit code, the risk of active exploitation is elevated. This vulnerability is particularly concerning as it could allow attackers to compromise the application&rsquo;s database, potentially leading to data theft, modification, or complete system takeover. Successful exploitation allows an unauthenticated attacker to execute arbitrary SQL queries against the backend database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Simple Food Order System 1.0 instance exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>register-router.php</code> endpoint.</li>
<li>Within the request, the attacker injects SQL code into the <code>Name</code> parameter.</li>
<li>The application fails to properly sanitize the injected SQL code, passing it directly to the database.</li>
<li>The database executes the malicious SQL query, potentially allowing the attacker to bypass authentication or access sensitive data.</li>
<li>The attacker retrieves sensitive information from the database, such as user credentials or order details.</li>
<li>Using the stolen credentials, the attacker gains unauthorized access to the application&rsquo;s administrative panel.</li>
<li>The attacker modifies data within the database, disrupting services or exfiltrating sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can have significant consequences. Attackers could gain unauthorized access to sensitive customer data, including personal information and financial details. This data could be used for identity theft, fraud, or sold on the dark web. The compromise of the database could also lead to data corruption, service disruption, or complete system takeover. Given the ease of exploitation, a large number of installations are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to the <code>Name</code> parameter in <code>register-router.php</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious SQL Injection Attempts</code> to monitor for exploitation attempts targeting this vulnerability.</li>
<li>Monitor web server logs for suspicious requests containing SQL syntax targeting the <code>register-router.php</code> endpoint (webserver log source).</li>
<li>Review and harden database server configurations to prevent unauthorized access.</li>
<li>Consider implementing a web application firewall (WAF) to filter out malicious requests.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>code-projects Simple Food Order System SQL Injection Vulnerability (CVE-2026-5017)</title><link>https://feed.craftedsignal.io/briefs/2026-03-simple-food-order-sqli/</link><pubDate>Sat, 28 Mar 2026 23:16:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-simple-food-order-sqli/</guid><description>CVE-2026-5017 is a SQL injection vulnerability in code-projects Simple Food Order System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'Status' parameter in the `/all-tickets.php` file.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-5017, affects code-projects Simple Food Order System version 1.0. This vulnerability resides within the <code>/all-tickets.php</code> file, specifically in how the application handles the &lsquo;Status&rsquo; parameter. A remote attacker can exploit this flaw by crafting malicious SQL queries via the &lsquo;Status&rsquo; argument, potentially leading to unauthorized data access, modification, or complete system compromise. The vulnerability has been publicly disclosed…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>SQL Injection Vulnerability in Sinaptik AI PandasAI lancedb Extension</title><link>https://feed.craftedsignal.io/briefs/2026-03-pandasai-sqli/</link><pubDate>Sat, 28 Mar 2026 12:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-pandasai-sqli/</guid><description>A SQL injection vulnerability exists in Sinaptik AI PandasAI up to version 0.1.4 within the pandasai-lancedb Extension, allowing remote exploitation through manipulation of multiple functions in the lancedb.py file.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in Sinaptik AI PandasAI versions up to 0.1.4. This vulnerability resides within the pandasai-lancedb Extension, specifically affecting the <code>delete_question_and_answers</code>, <code>delete_docs</code>, <code>update_question_answer</code>, <code>update_docs</code>, <code>get_relevant_question_answers_by_id</code>, and <code>get_relevant_docs_by_id</code> functions within the <code>lancedb.py</code> file. The vulnerability allows for remote exploitation, potentially enabling attackers to execute arbitrary SQL queries against the underlying database. A public exploit is available, increasing the risk of widespread exploitation. The vendor was contacted regarding this vulnerability but did not respond.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a PandasAI application using a vulnerable version (&lt;= 0.1.4) with the lancedb extension enabled.</li>
<li>The attacker crafts a malicious HTTP request targeting one of the vulnerable functions: <code>delete_question_and_answers</code>, <code>delete_docs</code>, <code>update_question_answer</code>, <code>update_docs</code>, <code>get_relevant_question_answers_by_id</code>, or <code>get_relevant_docs_by_id</code>.</li>
<li>The malicious request injects SQL code into parameters intended for legitimate database queries.</li>
<li>The PandasAI application&rsquo;s lancedb extension processes the request without proper sanitization or parameterization.</li>
<li>The injected SQL code is executed by the underlying database, modifying, deleting, or extracting sensitive data.</li>
<li>The attacker leverages the SQL injection to potentially escalate privileges within the database server.</li>
<li>The attacker can then use the escalated privileges to access other parts of the application or the underlying system.</li>
<li>The attacker exfiltrates sensitive data or compromises the integrity of the application and its data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to unauthorized access to sensitive data, data modification, or even complete database compromise. Depending on the application&rsquo;s function, this could result in exposure of personal information, financial data, or intellectual property. The availability of a public exploit increases the likelihood of widespread attacks. Without remediation, any application using a vulnerable version of PandasAI with the lancedb extension is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PandasAI to a version greater than 0.1.4 to patch the SQL injection vulnerability (CVE-2026-4996).</li>
<li>Implement input validation and sanitization measures on all user-supplied data to prevent SQL injection attacks targeting webserver logs.</li>
<li>Deploy the Sigma rule <code>Detect Potential PandasAI SQL Injection Attempts</code> to your SIEM to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>vulnerability</category><category>pandasai</category></item><item><title>WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-33991)</title><link>https://feed.craftedsignal.io/briefs/2026-03-wegia-sqli/</link><pubDate>Fri, 27 Mar 2026 23:17:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-wegia-sqli/</guid><description>WeGIA web manager prior to version 3.6.7 is vulnerable to SQL injection via the `id_tag` parameter in the `deletar_tag.php` script due to unsanitized input and direct concatenation into SQL queries, potentially allowing attackers to read, modify, or delete data.</description><content:encoded><![CDATA[<p>WeGIA, a web manager for charitable institutions, is susceptible to SQL injection in versions prior to 3.6.7. The vulnerability resides in the <code>html/socio/sistema/deletar_tag.php</code> file, where the application uses <code>extract($_REQUEST)</code> on line 14 and directly concatenates the <code>$id_tag</code> variable into SQL queries on lines 16-17. This occurs without proper sanitization or the use of prepared statements. The lack of input validation allows attackers to inject arbitrary SQL commands, potentially…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-33991</category><category>sql-injection</category><category>web-application</category></item><item><title>Shenzhen Ruiming Technology Streamax Crocus bis SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-streamax-sql-injection/</link><pubDate>Fri, 27 Mar 2026 04:16:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-streamax-sql-injection/</guid><description>A SQL injection vulnerability (CVE-2026-4910) exists in Shenzhen Ruiming Technology Streamax Crocus bis 1.3.44 via the /RemoteFormat.do endpoint, allowing remote attackers to execute arbitrary SQL commands by manipulating the State argument.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-4910, affects Shenzhen Ruiming Technology Streamax Crocus bis version 1.3.44. The vulnerability is located within the <code>/RemoteFormat.do</code> file, specifically the <code>Endpoint</code> component. By manipulating the <code>State</code> argument, a remote attacker can inject arbitrary SQL commands. Publicly available exploits exist, increasing the risk of exploitation. The vendor was notified but did not respond. Successful exploitation could lead to unauthorized data…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-4910</category><category>sql-injection</category><category>streamax</category><category>webserver</category></item><item><title>Ory Kratos SQL Injection Vulnerability in ListCourierMessages API</title><link>https://feed.craftedsignal.io/briefs/2024-01-ory-kratos-sqli/</link><pubDate>Thu, 26 Mar 2026 18:16:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ory-kratos-sqli/</guid><description>A SQL injection vulnerability exists in the ListCourierMessages Admin API of Ory Kratos versions prior to 26.2.0 due to flaws in its pagination implementation, allowing attackers to craft malicious tokens if the pagination secret is known or the default secret is used.</description><content:encoded><![CDATA[<p>Ory Kratos, an identity, user management, and authentication system for cloud services, is vulnerable to SQL injection in versions prior to 26.2.0. The vulnerability resides within the ListCourierMessages Admin API and stems from flaws in its pagination implementation. The pagination tokens are encrypted using a secret configured in <code>secrets.pagination</code>. Attackers who obtain this secret can forge malicious tokens, leading to SQL injection attacks. Critically, if this configuration value remains unset, Kratos defaults to a publicly known pagination encryption secret. This allows attackers to manually generate valid malicious pagination tokens for vulnerable installations. Defenders should immediately configure a custom value for <code>secrets.pagination</code> using a cryptographically secure random secret and upgrade Kratos to version 26.2.0 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Ory Kratos instance running a version prior to 26.2.0.</li>
<li>Attacker checks the Kratos configuration to determine if <code>secrets.pagination</code> is set.</li>
<li>If <code>secrets.pagination</code> is not set, the attacker leverages the publicly known default pagination encryption secret.</li>
<li>The attacker crafts a malicious pagination token containing SQL injection payloads. This token exploits the vulnerable pagination logic in the <code>ListCourierMessages</code> API.</li>
<li>Attacker sends a request to the <code>/admin/courier/messages</code> endpoint with the crafted pagination token in the <code>page_token</code> parameter.</li>
<li>The Kratos application processes the malicious token, leading to the execution of arbitrary SQL queries against the underlying database.</li>
<li>The SQL injection allows the attacker to potentially read, modify, or delete sensitive data within the Kratos database, including user credentials, configuration settings, or other confidential information.</li>
<li>The attacker may use the compromised data for further attacks, such as account takeover or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to complete compromise of the Ory Kratos instance. This can result in unauthorized access to user accounts, disclosure of sensitive information, and potential data manipulation or deletion. The severity is high due to the potential for significant data breach and service disruption impacting all users managed by the compromised Kratos instance. The number of victims depends on the size and user base of the affected Ory Kratos deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately configure a custom value for <code>secrets.pagination</code> by generating a cryptographically secure random secret within your Ory Kratos configuration (reference: Overview section).</li>
<li>Upgrade Ory Kratos to version 26.2.0 or later to patch the SQL injection vulnerability (reference: Overview section).</li>
<li>Monitor web server logs for suspicious requests to the <code>/admin/courier/messages</code> endpoint containing unusually long or malformed <code>page_token</code> parameters (create a custom rule based on this behavior).</li>
<li>Implement a Web Application Firewall (WAF) rule to block requests with suspicious SQL syntax in the <code>page_token</code> parameter targeting the <code>/admin/courier/messages</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ory-kratos</category><category>sql-injection</category><category>cve-2026-33503</category><category>cloud</category></item><item><title>Kysely SQL Injection Vulnerability (CVE-2026-33468)</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-kysely-sql-injection/</link><pubDate>Thu, 26 Mar 2026 17:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-kysely-sql-injection/</guid><description>A SQL injection vulnerability exists in Kysely versions prior to 0.28.14 due to insufficient backslash escaping in the `DefaultQueryCompiler.sanitizeStringLiteral()` function, potentially allowing attackers to inject arbitrary SQL when using the MySQL dialect, specifically affecting `CreateIndexBuilder.where()` and `CreateViewBuilder.as()` methods.</description><content:encoded><![CDATA[<p>Kysely, a type-safe TypeScript SQL query builder, is susceptible to a SQL injection vulnerability in versions prior to 0.28.14. The vulnerability, identified as CVE-2026-33468, stems from the <code>DefaultQueryCompiler.sanitizeStringLiteral()</code> function&rsquo;s failure to properly escape backslashes. This incomplete sanitization, in conjunction with the MySQL dialect&rsquo;s default setting where <code>NO_BACKSLASH_ESCAPES</code> is OFF, enables attackers to bypass string literal contexts by injecting arbitrary SQL…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kysely</category><category>sql-injection</category><category>cve-2026-33468</category></item><item><title>SQL Injection Vulnerability in Kysely TypeScript Library (CVE-2026-33442)</title><link>https://feed.craftedsignal.io/briefs/2026-03-kysely-sql-injection/</link><pubDate>Thu, 26 Mar 2026 17:16:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-kysely-sql-injection/</guid><description>Kysely versions 0.28.12 and 0.28.13 are vulnerable to SQL injection due to insufficient escaping of backslashes in the `sanitizeStringLiteral` method, potentially leading to arbitrary SQL execution on MySQL servers.</description><content:encoded><![CDATA[<p>Kysely, a type-safe TypeScript SQL query builder, is susceptible to a SQL injection vulnerability identified as CVE-2026-33442. The vulnerability resides in the <code>sanitizeStringLiteral</code> method of the query compiler within versions 0.28.12 and 0.28.13. The method inadequately handles backslashes, failing to escape them, while properly escaping single quotes. On MySQL servers configured with the default <code>BACKSLASH_ESCAPES</code> SQL mode enabled, this oversight allows an attacker to inject a backslash…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>kysely</category><category>cve-2026-33442</category></item><item><title>HCL Aftermarket DPC SQL Injection Vulnerability (CVE-2025-55262)</title><link>https://feed.craftedsignal.io/briefs/2026-03-hcl-aftermarket-sql-injection/</link><pubDate>Thu, 26 Mar 2026 14:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-hcl-aftermarket-sql-injection/</guid><description>CVE-2025-55262 is a SQL Injection vulnerability affecting HCL Aftermarket DPC, allowing an attacker to retrieve sensitive information from the database and potentially gain unauthorized access.</description><content:encoded>&lt;p>A SQL Injection vulnerability, identified as CVE-2025-55262, affects HCL Aftermarket DPC. This vulnerability allows an attacker to inject malicious SQL code into input fields, which can then be executed by the database. Successful exploitation could lead to the retrieval of sensitive information from the database, potentially exposing user credentials, financial data, or other confidential information. The vulnerability was reported by HCL Software and has a CVSS v3.1 score of 8.3, indicating a…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2025-55262</category><category>sql-injection</category><category>web-application</category></item><item><title>Online Quiz Maker 1.0 SQL Injection Vulnerability (CVE-2018-25207)</title><link>https://feed.craftedsignal.io/briefs/2026-03-online-quiz-maker-sqli/</link><pubDate>Thu, 26 Mar 2026 12:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-online-quiz-maker-sqli/</guid><description>Online Quiz Maker 1.0 is vulnerable to SQL injection via the catid and usern parameters, allowing authenticated attackers to execute arbitrary SQL commands by submitting malicious POST requests to quiz-system.php or add-category.php.</description><content:encoded><![CDATA[<p>Online Quiz Maker 1.0 is susceptible to SQL injection vulnerabilities, specifically identified as CVE-2018-25207. The vulnerability resides in the <code>catid</code> and <code>usern</code> parameters, which can be exploited by an authenticated attacker to inject arbitrary SQL commands. The attack vector involves crafting malicious POST requests to either <code>quiz-system.php</code> or <code>add-category.php</code>. Successful exploitation of this vulnerability can lead to unauthorized access to sensitive data stored in the database…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2018-25207</category><category>web-application</category></item><item><title>ASP.NET jVideo Kit 1.0 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-jvideo-sql-injection/</link><pubDate>Thu, 26 Mar 2026 12:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-jvideo-sql-injection/</guid><description>ASP.NET jVideo Kit 1.0 is vulnerable to SQL injection via the 'query' parameter in the search functionality, allowing unauthenticated attackers to inject malicious SQL payloads to extract sensitive database information.</description><content:encoded><![CDATA[<p>ASP.NET jVideo Kit 1.0 is susceptible to an SQL injection vulnerability (CVE-2018-25205) affecting its search functionality. This vulnerability enables unauthenticated attackers to inject arbitrary SQL commands by manipulating the &lsquo;query&rsquo; parameter. The attack can be carried out via both GET and POST requests directed towards the <code>/search</code> endpoint. Successful exploitation allows attackers to perform boolean-based blind or error-based SQL injection techniques, potentially leading to the extraction of sensitive database information. This vulnerability was published on March 26, 2026. Defenders should prioritize patching or mitigating this vulnerability to prevent unauthorized access to sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies an ASP.NET jVideo Kit 1.0 instance.</li>
<li>The attacker crafts a malicious SQL payload designed to exploit the &lsquo;query&rsquo; parameter in the <code>/search</code> endpoint.</li>
<li>The attacker sends a GET or POST request to the <code>/search</code> endpoint with the crafted SQL payload embedded in the <code>query</code> parameter.</li>
<li>The ASP.NET application fails to properly sanitize the input from the <code>query</code> parameter before using it in a database query.</li>
<li>The malicious SQL payload is executed against the database.</li>
<li>Depending on the SQL injection technique (boolean-based blind, error-based), the attacker infers information about the database structure and data.</li>
<li>The attacker refines the SQL payloads to extract sensitive data, such as usernames, passwords, or other confidential information.</li>
<li>The attacker exfiltrates the extracted data for malicious purposes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2018-25205) allows unauthenticated attackers to extract sensitive information from the affected ASP.NET jVideo Kit 1.0 database. The number of affected installations is unknown, but the vulnerability could lead to data breaches, compromise of user accounts, and potential reputational damage to organizations using the vulnerable software. The affected software is a video sharing script, making content websites a key target.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates for ASP.NET jVideo Kit 1.0 to address CVE-2018-25205.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection attacks against the <code>/search</code> endpoint, focusing on the &lsquo;query&rsquo; parameter.</li>
<li>Deploy the following Sigma rule to detect exploitation attempts targeting the <code>/search</code> endpoint with potentially malicious SQL queries.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>vulnerability</category><category>asp.net</category></item><item><title>School Management System CMS 1.0 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-school-mgmt-sql-injection/</link><pubDate>Thu, 26 Mar 2026 12:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-school-mgmt-sql-injection/</guid><description>School Management System CMS 1.0 is vulnerable to SQL injection in the admin login functionality, allowing attackers to bypass authentication by injecting SQL code through the username parameter.</description><content:encoded><![CDATA[<p>School Management System CMS 1.0 is vulnerable to SQL injection affecting the admin login functionality. Disclosed in March 2026, the vulnerability allows unauthenticated attackers to bypass the login mechanism and gain administrative access by injecting malicious SQL code into the username parameter of the processlogin endpoint. The vulnerability stems from improper sanitization of user-supplied input, enabling boolean-based blind SQL injection. Successful exploitation grants full administrative privileges, potentially leading to data breaches, system compromise, and unauthorized modification of sensitive information. Given the sensitive nature of school management data, this vulnerability poses a significant risk to organizations using the affected software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a School Management System CMS 1.0 instance accessible over the network.</li>
<li>The attacker navigates to the admin login page and identifies the vulnerable username parameter in the login form.</li>
<li>The attacker crafts a malicious SQL injection payload designed for boolean-based blind SQL injection.</li>
<li>The attacker sends the crafted payload to the /processlogin endpoint via a POST request through the username parameter.</li>
<li>The application processes the SQL injection, executing attacker-controlled SQL code against the database.</li>
<li>Based on the application&rsquo;s response (e.g., successful login), the attacker refines the payload to extract sensitive information or bypass authentication.</li>
<li>The attacker successfully authenticates as an administrator without valid credentials.</li>
<li>The attacker accesses administrative functionalities, potentially leading to data exfiltration, modification, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2018-25201) could lead to full compromise of the School Management System CMS 1.0 instance. Attackers could gain unauthorized access to student records, financial data, and other sensitive information. Observed damage includes potential data breaches, defacement of the system, and complete loss of confidentiality, integrity, and availability. Due to the sensitive nature of data handled by school management systems, this vulnerability has a critical impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrades to School Management System CMS 1.0 to address CVE-2018-25201.</li>
<li>Deploy the Sigma rules provided to detect exploitation attempts against the /processlogin endpoint.</li>
<li>Implement input validation and sanitization on all user-supplied data, especially the username parameter, to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious POST requests to the /processlogin endpoint containing SQL injection payloads.</li>
<li>Conduct regular security audits and penetration testing to identify and remediate vulnerabilities in School Management System CMS 1.0.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>code-projects Online Food Ordering System SQL Injection Vulnerability (CVE-2026-4844)</title><link>https://feed.craftedsignal.io/briefs/2026-03-online-food-ordering-sqli/</link><pubDate>Thu, 26 Mar 2026 05:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-online-food-ordering-sqli/</guid><description>CVE-2026-4844 describes a SQL injection vulnerability in the Admin Login Module of code-projects Online Food Ordering System 1.0, which can be exploited remotely by manipulating the Username argument in the /admin.php file.</description><content:encoded>&lt;p>A SQL injection vulnerability, identified as CVE-2026-4844, affects the code-projects Online Food Ordering System version 1.0. Specifically, the vulnerability resides within the Admin Login Module and is triggered by manipulating the Username argument when processing the &lt;code>/admin.php&lt;/code> file. This allows a remote attacker to inject arbitrary SQL commands. Public exploits are available, increasing the risk of exploitation. Successful exploitation can lead to unauthorized access to the database…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-4844</category></item><item><title>OpenCart Core SQL Injection Vulnerability (CVE-2024-58341)</title><link>https://feed.craftedsignal.io/briefs/2026-03-opencart-sqli/</link><pubDate>Wed, 25 Mar 2026 16:16:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-opencart-sqli/</guid><description>OpenCart Core 4.0.2.3 is vulnerable to SQL injection via the 'search' parameter, enabling unauthenticated attackers to manipulate database queries and extract sensitive information through boolean-based or time-based blind SQL injection.</description><content:encoded><![CDATA[<p>OpenCart Core 4.0.2.3 is susceptible to a SQL injection vulnerability that allows unauthenticated remote attackers to inject arbitrary SQL commands through the &lsquo;search&rsquo; parameter. The vulnerability, identified as CVE-2024-58341, allows attackers to craft malicious GET requests to the product search endpoint, potentially leading to the extraction of sensitive database information. The attack relies on the injection of SQL code within the &lsquo;search&rsquo; parameter, exploiting the lack of proper input…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2024-58341</category><category>sql-injection</category><category>opencart</category></item><item><title>SourceCodester Online Catering Reservation SQL Injection Vulnerability (CVE-2026-4615)</title><link>https://feed.craftedsignal.io/briefs/2026-03-online-catering-sqli/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-online-catering-sqli/</guid><description>A SQL injection vulnerability exists in SourceCodester Online Catering Reservation 1.0's `/search.php` file, allowing remote attackers to execute arbitrary SQL commands by manipulating the `rcode` argument.</description><content:encoded><![CDATA[<p>SourceCodester Online Catering Reservation 1.0 is vulnerable to SQL injection, as identified by CVE-2026-4615. The vulnerability resides within the <code>/search.php</code> file and can be triggered by manipulating the <code>rcode</code> argument. This allows a remote attacker to inject arbitrary SQL queries into the application&rsquo;s database, potentially leading to data breaches, modification of data, or complete compromise of the database server. The vulnerability was reported on March 23, 2026, and a public exploit…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-4615</category><category>web-application</category></item><item><title>SQL Injection Vulnerability in Free Hotel Reservation System 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-03-hotel-reservation-sqli/</link><pubDate>Tue, 24 Mar 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-hotel-reservation-sqli/</guid><description>A SQL injection vulnerability (CVE-2026-4612) exists in itsourcecode Free Hotel Reservation System 1.0 within the Parameter Handler component, allowing remote attackers to execute arbitrary SQL commands via the account_id parameter in the /hotel/admin/mod_users/index.php script.</description><content:encoded><![CDATA[<p>The itsourcecode Free Hotel Reservation System 1.0 is vulnerable to SQL injection (CVE-2026-4612). The vulnerability resides in the Parameter Handler component, specifically affecting the <code>/hotel/admin/mod_users/index.php</code> script. By manipulating the <code>account_id</code> parameter, a remote attacker can inject arbitrary SQL commands into the application&rsquo;s database queries. The vulnerability was reported in March 2026 and has a CVSS v3.1 score of 7.3 (HIGH). Publicly available exploit code increases the…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-4612</category><category>sql-injection</category><category>web-application</category></item><item><title>eNdonesia Portal v8.7 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-endonesia-sql-injection/</link><pubDate>Tue, 24 Mar 2026 12:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-endonesia-sql-injection/</guid><description>eNdonesia Portal v8.7 is vulnerable to SQL injection allowing unauthenticated attackers to execute arbitrary SQL queries via the bid parameter in banners.php, potentially leading to sensitive data extraction.</description><content:encoded><![CDATA[<p>eNdonesia Portal v8.7 is susceptible to SQL injection vulnerabilities. Unauthenticated attackers can exploit this flaw by injecting malicious SQL code through the <code>bid</code> parameter in the <code>banners.php</code> script. The vulnerability allows attackers to execute arbitrary SQL queries against the application&rsquo;s database. Successful exploitation could lead to the unauthorized extraction of sensitive information, including database schema details from <code>INFORMATION_SCHEMA</code> tables. This vulnerability, identified as CVE-2019-25643, poses a significant risk due to the ease of exploitation and the potential for extensive data compromise. The vulnerability was reported on March 24, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies an eNdonesia Portal v8.7 instance.</li>
<li>The attacker crafts a malicious SQL payload designed to extract data from the <code>INFORMATION_SCHEMA</code> tables.</li>
<li>The attacker constructs a GET request targeting <code>banners.php</code>.</li>
<li>The crafted SQL payload is injected into the <code>bid</code> parameter of the GET request: <code>banners.php?bid=&lt;SQL_payload&gt;</code>.</li>
<li>The web server processes the request and executes the injected SQL query against the database.</li>
<li>The database returns the results of the SQL query, potentially including sensitive data or schema information.</li>
<li>The attacker receives the database response containing the extracted information.</li>
<li>The attacker analyzes the extracted information to further compromise the system or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to the unauthorized disclosure of sensitive data, including user credentials, financial information, and other confidential data stored in the eNdonesia Portal v8.7 database. The impact could range from defacement of the website to complete compromise of the underlying database server. Although the number of affected installations is unknown, any instance of eNdonesia Portal v8.7 is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detecting eNdonesia banners.php SQL Injection Attempt</code> to your SIEM to identify exploitation attempts targeting the <code>banners.php</code> endpoint.</li>
<li>Examine web server logs for GET requests to <code>banners.php</code> containing suspicious SQL syntax within the <code>bid</code> parameter (reference the log source in the Sigma rule).</li>
<li>Apply available patches or updates for eNdonesia Portal v8.7 to remediate the CVE-2019-25643 vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2019-25643</category></item><item><title>Bootstrapy CMS Unauthenticated SQL Injection Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-03-bootstrapy-sqli/</link><pubDate>Tue, 24 Mar 2026 12:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-bootstrapy-sqli/</guid><description>Bootstrapy CMS contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through POST parameters to extract sensitive database information or cause denial of service.</description><content:encoded><![CDATA[<p>Bootstrapy CMS is vulnerable to multiple SQL injection vulnerabilities (CVE-2019-25642). These vulnerabilities allow unauthenticated attackers to execute arbitrary SQL queries. The attack vector involves injecting malicious SQL code via POST parameters in specific PHP files: <code>forum-thread.php</code>, <code>contact-submit.php</code>, and <code>post-new-submit.php</code>. Successful exploitation can lead to sensitive database information disclosure or a denial-of-service condition. The identified vulnerabilities exist in the latest version of Bootstrapy CMS as of March 2026, and the exploitation does not require any authentication. This poses a significant threat to organizations using this CMS.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Bootstrapy CMS instance.</li>
<li>The attacker crafts a malicious HTTP POST request targeting one of the vulnerable PHP files: <code>forum-thread.php</code>, <code>contact-submit.php</code>, or <code>post-new-submit.php</code>.</li>
<li>The attacker injects a SQL payload into the <code>thread_id</code> parameter of <code>forum-thread.php</code>, the <code>subject</code> parameter of <code>contact-submit.php</code>, or the <code>post-id</code> parameter of <code>post-new-submit.php</code>.</li>
<li>The web server processes the request, passing the injected SQL payload to the database.</li>
<li>The database executes the malicious SQL query, potentially allowing the attacker to read sensitive data.</li>
<li>The attacker retrieves sensitive data from the database, such as user credentials, configuration settings, or other confidential information.</li>
<li>Alternatively, the attacker injects a SQL payload designed to cause a denial-of-service condition by consuming excessive database resources.</li>
<li>The attacker disrupts the availability of the Bootstrapy CMS instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these SQL injection vulnerabilities can lead to the complete compromise of the Bootstrapy CMS database. This may include the theft of sensitive user data, modification of website content, or complete denial of service. The impact is high because it affects the confidentiality, integrity, and availability of the application and its data. The number of affected installations is unknown, but any organization running a vulnerable version of Bootstrapy CMS is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for HTTP POST requests to <code>forum-thread.php</code>, <code>contact-submit.php</code>, and <code>post-new-submit.php</code> containing suspicious SQL syntax in the <code>thread_id</code>, <code>subject</code>, or <code>post-id</code> parameters, as covered by the Sigma rules below.</li>
<li>Apply available patches from the vendor to remediate CVE-2019-25642.</li>
<li>Block access to the known exploit URLs in the IOC list at your web application firewall (WAF).</li>
<li>Implement input validation and sanitization for all user-supplied data to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>bootstrapy-cms</category><category>vulnerability</category></item><item><title>Inout Article Base CMS SQL Injection Vulnerability (CVE-2019-25640)</title><link>https://feed.craftedsignal.io/briefs/2026-03-inout-article-sql-injection/</link><pubDate>Tue, 24 Mar 2026 12:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-inout-article-sql-injection/</guid><description>Inout Article Base CMS is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries through the 'p' and 'u' parameters via XOR-based payloads in GET requests to portalLogin.php, potentially leading to sensitive information extraction or denial-of-service.</description><content:encoded><![CDATA[<p>Inout Article Base CMS is susceptible to SQL injection vulnerabilities (CVE-2019-25640). Unauthenticated attackers can exploit these vulnerabilities by manipulating database queries via the &lsquo;p&rsquo; and &lsquo;u&rsquo; parameters in GET requests to the <code>portalLogin.php</code> script. The attack leverages XOR-based SQL injection payloads. Successful exploitation can allow attackers to extract sensitive database information or cause a denial of service through time-based attacks. This vulnerability poses a significant…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2019-25640</category><category>inout-article-base-cms</category></item><item><title>Zeeways Matrimony CMS Unauthenticated SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-zeeways-sql-injection/</link><pubDate>Tue, 24 Mar 2026 12:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-zeeways-sql-injection/</guid><description>Zeeways Matrimony CMS is vulnerable to SQL injection via the profile_list endpoint, where an unauthenticated attacker can inject SQL code via the up_cast, s_mother, and s_religion parameters, potentially allowing them to extract sensitive information.</description><content:encoded><![CDATA[<p>Zeeways Matrimony CMS is susceptible to SQL injection vulnerabilities affecting the profile_list endpoint. This vulnerability allows unauthenticated attackers to inject malicious SQL code through the <code>up_cast</code>, <code>s_mother</code>, and <code>s_religion</code> parameters. Successful exploitation could lead to unauthorized access to sensitive data within the database. The vulnerability was reported in CVE-2019-25635. The vulnerable software is Zeeways Matrimony CMS, and it&rsquo;s crucial for organizations using this CMS to apply necessary patches or mitigations to prevent potential data breaches. Defenders should prioritize monitoring web server logs for suspicious activity targeting these specific parameters and the <code>profile_list</code> endpoint.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Zeeways Matrimony CMS instance.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>profile_list</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>up_cast</code>, <code>s_mother</code>, or <code>s_religion</code> parameters of the HTTP request.</li>
<li>The web server processes the request and executes the injected SQL code against the database.</li>
<li>Depending on the injected SQL, the attacker can extract sensitive information from the database, such as user credentials or personal details, using time-based or error-based techniques.</li>
<li>The attacker analyzes the extracted data to identify valuable information.</li>
<li>The attacker may use the extracted credentials to further compromise the system or access other resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to a full database compromise, potentially exposing sensitive user data including personal information, credentials, and financial details. This can result in significant reputational damage, financial losses due to regulatory fines, and legal repercussions for organizations using the vulnerable Zeeways Matrimony CMS. The impact is high due to the ease of exploitation (unauthenticated) and the potential for complete data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious HTTP requests targeting the <code>/profile_list</code> endpoint with SQL injection attempts in the <code>up_cast</code>, <code>s_mother</code>, and <code>s_religion</code> parameters (see IOC table and enable webserver logging).</li>
<li>Apply available patches or updates for Zeeways Matrimony CMS to address CVE-2019-25635.</li>
<li>Deploy the Sigma rule provided to detect exploitation attempts targeting the specified parameters in the URL.</li>
<li>Implement input validation and sanitization for all user-supplied data, especially for parameters used in database queries to prevent future SQL injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>matrimony-cms</category></item><item><title>Zeeways Jobsite CMS SQL Injection Vulnerability (CVE-2019-25636)</title><link>https://feed.craftedsignal.io/briefs/2026-03-zeeways-sqli/</link><pubDate>Tue, 24 Mar 2026 12:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-zeeways-sqli/</guid><description>Zeeways Jobsite CMS is vulnerable to SQL injection, allowing unauthenticated attackers to inject SQL code through the 'id' GET parameter in crafted requests to news_details.php, jobs_details.php, or job_cmp_details.php to extract sensitive database information.</description><content:encoded><![CDATA[<p>Zeeways Jobsite CMS is vulnerable to SQL injection (CVE-2019-25636). This vulnerability allows unauthenticated attackers to inject arbitrary SQL code into database queries via the &lsquo;id&rsquo; GET parameter. The vulnerability affects the news_details.php, jobs_details.php, and job_cmp_details.php files. By sending crafted HTTP requests with malicious &lsquo;id&rsquo; parameter values, attackers can manipulate database queries using techniques like GROUP BY and CASE statements. The initial report was published…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2019-25636</category><category>web-application</category></item><item><title>Meeplace Business Review Script SQL Injection Vulnerability (CVE-2019-25638)</title><link>https://feed.craftedsignal.io/briefs/2026-03-meeplace-sql-injection/</link><pubDate>Tue, 24 Mar 2026 12:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-meeplace-sql-injection/</guid><description>Meeplace Business Review Script is vulnerable to SQL injection via the 'id' parameter in the addclick.php endpoint, allowing unauthenticated attackers to execute arbitrary SQL queries and potentially extract sensitive database information or cause a denial of service.</description><content:encoded><![CDATA[<p>Meeplace Business Review Script is susceptible to an SQL injection vulnerability (CVE-2019-25638) affecting the addclick.php endpoint. Unauthenticated attackers can exploit this vulnerability by injecting malicious SQL code through the &lsquo;id&rsquo; parameter in GET requests. This can lead to the execution of arbitrary SQL queries, potentially enabling attackers to retrieve sensitive database information or trigger a denial-of-service condition. The vulnerability was published on 2026-03-24 and poses a…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2019-25638</category></item><item><title>WP Job Portal Plugin SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-wp-job-portal-sqli/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-wp-job-portal-sqli/</guid><description>The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter, allowing unauthenticated attackers to extract sensitive database information in versions up to 2.4.8.</description><content:encoded><![CDATA[<p>The WP Job Portal plugin for WordPress, a widely used plugin for managing job listings, is susceptible to SQL Injection attacks. This vulnerability, identified as CVE-2026-4306, affects all versions up to and including 2.4.8. The flaw stems from the insufficient sanitization of the &lsquo;radius&rsquo; parameter, which is directly incorporated into SQL queries without proper escaping. This lack of input validation enables unauthenticated attackers to inject malicious SQL code into the application&rsquo;s database queries. Successful exploitation could lead to the unauthorized disclosure of sensitive information stored within the WordPress database. Given the popularity of WordPress and the WP Job Portal plugin, a successful attack could impact a large number of websites and expose confidential data, including user credentials, financial details, and other sensitive information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious HTTP request targeting the WordPress website running the vulnerable WP Job Portal plugin.</li>
<li>The attacker appends a SQL injection payload to the &lsquo;radius&rsquo; parameter within the HTTP request.</li>
<li>The vulnerable plugin receives the request and incorporates the unsanitized &lsquo;radius&rsquo; parameter into an SQL query within <code>includes/ajax.php</code> or <code>modules/job/model.php</code>.</li>
<li>The injected SQL code is executed against the WordPress database due to the lack of proper input validation and escaping.</li>
<li>The attacker leverages the SQL injection to extract sensitive information from the database, such as user credentials, API keys, or other confidential data.</li>
<li>The extracted data may be exfiltrated from the server using various techniques.</li>
<li>The attacker could potentially use the compromised data to gain further access to the WordPress site or connected systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL Injection vulnerability (CVE-2026-4306) could lead to the complete compromise of the WordPress database. Attackers could gain access to sensitive information, including user credentials, customer data, and confidential business information. The vulnerability impacts all users running WP Job Portal plugin versions 2.4.8 and earlier. The CVSS v3.1 score is 7.5, indicating a high severity risk. The impact includes unauthorized data access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Job Portal plugin to version 2.4.9 or later to patch the SQL Injection vulnerability (CVE-2026-4306).</li>
<li>Deploy a web application firewall (WAF) with rules to detect and block SQL Injection attempts targeting the &lsquo;radius&rsquo; parameter in WordPress plugins.</li>
<li>Enable detailed logging for your web server (category &ldquo;webserver&rdquo;, product &ldquo;linux|windows&rdquo;) to monitor for suspicious activity and potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>plugin</category></item><item><title>SourceCodester Online Library Management System SQL Injection Vulnerability (CVE-2026-4624)</title><link>https://feed.craftedsignal.io/briefs/2026-03-online-library-sqli/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-online-library-sqli/</guid><description>A remote SQL injection vulnerability (CVE-2026-4624) exists in SourceCodester Online Library Management System 1.0 by manipulating the 'searchField' parameter in the /home.php file, potentially allowing attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-4624, affects SourceCodester Online Library Management System version 1.0. The vulnerability resides within the <code>/home.php</code> file, specifically in the parameter handler component. By manipulating the <code>searchField</code> argument, an attacker can inject malicious SQL code. The attack is remotely exploitable, meaning that an attacker does not need local access to the server. Given the public availability of the exploit, organizations using the…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-4624</category><category>web-application</category></item></channel></rss>