<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sqli — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/sqli/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 12:16:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/sqli/feed.xml" rel="self" type="application/rss+xml"/><item><title>Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4062)</title><link>https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sqli/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sqli/</guid><description>The Geo Mashup WordPress plugin is vulnerable to Time-Based SQL Injection due to insufficient input sanitization, allowing unauthenticated attackers to extract sensitive database information.</description><content:encoded><![CDATA[<p>The Geo Mashup plugin for WordPress, in versions up to and including 1.13.18, contains a Time-Based SQL Injection vulnerability (CVE-2026-4062). The vulnerability exists within the &lsquo;object_ids&rsquo; and &rsquo;exclude_object_ids&rsquo; parameters. Insufficient escaping of user-supplied input, specifically within the <code>IN(...)</code> and <code>NOT IN(...)</code> SQL context, coupled with inadequate preparation of the existing SQL query, allows for the injection. The <code>esc_sql()</code> function is applied but is rendered ineffective due to its inability to protect against parenthesis or SQL keyword injection within the unquoted <code>IN(...)</code> / <code>NOT IN(...)</code> context. A numeric-only sanitizer exists in <code>sanitize_query_args()</code>, but this is only applied in the AJAX code path and not in the <code>render-map.php</code> or template tag code paths. This flaw enables unauthenticated attackers to append malicious SQL queries, facilitating the extraction of sensitive information from the WordPress database through a time-based blind SQL injection technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the vulnerable Geo Mashup plugin running on a WordPress site.</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that utilizes the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameters.</li>
<li>The attacker injects a time-based SQL injection payload into the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameter. This payload leverages SQL functions like <code>SLEEP()</code> or <code>BENCHMARK()</code> to introduce delays based on conditional SQL logic.</li>
<li>The vulnerable code fails to properly sanitize the injected SQL code due to the ineffective <code>esc_sql()</code> function in the <code>IN</code>/<code>NOT IN</code> context.</li>
<li>The injected SQL payload is appended to the existing SQL query executed by the Geo Mashup plugin.</li>
<li>The database server executes the combined query, including the injected time-based SQL injection.</li>
<li>The attacker monitors the response time of the HTTP request. A delayed response indicates that the injected SQL logic evaluated to true.</li>
<li>By repeatedly sending requests with different SQL injection payloads, the attacker can extract sensitive information from the database one character at a time.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to the complete compromise of the WordPress database. An attacker can extract sensitive information such as user credentials, API keys, configuration details, and other confidential data. This can result in data breaches, unauthorized access to the WordPress site, and potential further attacks on connected systems. The CVSS v3.1 base score for this vulnerability is 7.5, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Geo Mashup plugin to a version greater than 1.13.18 to remediate CVE-2026-4062.</li>
<li>Deploy the Sigma rule <code>Detect Geo Mashup Time-Based SQL Injection Attempts</code> to identify potential exploitation attempts targeting the vulnerable parameters.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads in the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameters to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>wordpress</category><category>plugin</category></item><item><title>Sunnet CTMS SQL Injection Vulnerability (CVE-2026-7489)</title><link>https://feed.craftedsignal.io/briefs/2026-05-sunnet-ctms-sqli/</link><pubDate>Sat, 02 May 2026 10:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sunnet-ctms-sqli/</guid><description>Sunnet CTMS is vulnerable to SQL injection (CVE-2026-7489), allowing authenticated remote attackers to execute arbitrary SQL commands and compromise the database.</description><content:encoded><![CDATA[<p>A SQL Injection vulnerability, identified as CVE-2026-7489, exists in CTMS developed by Sunnet. This flaw allows authenticated remote attackers to inject arbitrary SQL commands. Successful exploitation could allow the attackers to read, modify, and delete database contents. The vulnerability was published on May 2, 2026. The scope of this vulnerability affects systems running the vulnerable CTMS software, potentially leading to data breaches and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the CTMS application.</li>
<li>The attacker identifies an endpoint vulnerable to SQL injection.</li>
<li>The attacker crafts a malicious SQL query designed to exploit the injection point, likely using tools like Burp Suite or SQLMap.</li>
<li>The attacker injects the SQL payload via a crafted HTTP request, targeting vulnerable parameters within the request.</li>
<li>The CTMS application executes the injected SQL query against the database.</li>
<li>The attacker bypasses authentication or authorization controls to gain elevated privileges within the application or database.</li>
<li>The attacker reads sensitive data from the database, such as user credentials or confidential business information.</li>
<li>The attacker modifies or deletes database entries, leading to data corruption or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could allow attackers to read sensitive information, modify data, or delete critical database contents. This could lead to a complete compromise of the CTMS application and its underlying database, impacting all users and data managed by the system. The severity is heightened by the potential for attackers to gain complete control over the database, leading to significant data breaches and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade CTMS to a version that addresses CVE-2026-7489 as soon as it becomes available from Sunnet.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Attempts&rdquo; to identify potential exploitation attempts against CTMS (see below).</li>
<li>Review web server logs for suspicious activity indicative of SQL injection attempts, specifically looking for unusual characters or SQL syntax in HTTP request parameters.</li>
<li>Implement proper input validation and sanitization techniques to prevent SQL injection vulnerabilities in CTMS and other web applications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-7489</category><category>web-application</category></item><item><title>SourceCodester Advanced School Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-asms-sqli/</link><pubDate>Fri, 01 May 2026 02:16:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-asms-sqli/</guid><description>A SQL injection vulnerability (CVE-2026-7545) exists in SourceCodester Advanced School Management System 1.0 within the checkEmail endpoint of commonController.php, allowing remote attackers to potentially execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>SourceCodester Advanced School Management System version 1.0 is vulnerable to SQL injection in the <code>checkEmail</code> endpoint within the <code>commonController.php</code> file. This vulnerability, identified as CVE-2026-7545, allows a remote attacker to inject arbitrary SQL commands. Publicly available exploits targeting this vulnerability increase the risk of exploitation. Successful exploitation could lead to unauthorized data access, modification, or deletion within the application&rsquo;s database. Given the availability of public exploits, organizations using this software are at an elevated risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the <code>checkEmail</code> endpoint in <code>commonController.php</code>.</li>
<li>The attacker crafts a malicious HTTP request to the <code>checkEmail</code> endpoint, injecting SQL code into the email parameter.</li>
<li>The vulnerable application fails to properly sanitize the email input.</li>
<li>The injected SQL code is passed directly to the database query.</li>
<li>The database executes the malicious SQL code.</li>
<li>The attacker gains unauthorized access to the database.</li>
<li>The attacker may then read sensitive data, modify existing data, or insert new malicious data.</li>
<li>The attacker might also use this to escalate privileges within the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7545) could allow an attacker to read, modify, or delete sensitive data stored in the Advanced School Management System database. This could include student records, financial information, or administrative credentials. The availability of public exploits increases the likelihood of attacks targeting this vulnerability, potentially impacting any organization using the affected software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>checkEmail</code> endpoint in <code>commonController.php</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule <code>Detect ASMS CheckEmail SQL Injection Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious activity related to the <code>checkEmail</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>vulnerability</category><category>web-application</category></item><item><title>SSCMS v7.4.0 SQL Injection Vulnerability in stl:sqlContent Tag</title><link>https://feed.craftedsignal.io/briefs/2026-04-sscms-sqli/</link><pubDate>Thu, 30 Apr 2026 21:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sscms-sqli/</guid><description>SSCMS v7.4.0 is vulnerable to SQL injection via the stl:sqlContent tag's queryString attribute, allowing attackers to execute arbitrary SQL statements through crafted payloads submitted to the /api/stl/actions/dynamic endpoint.</description><content:encoded><![CDATA[<p>SSCMS v7.4.0 is susceptible to a SQL injection vulnerability (CVE-2026-7435) within the <code>stl:sqlContent</code> tag. The vulnerability arises because the <code>queryString</code> attribute is passed directly to database execution without adequate sanitization or parameterization. This flaw enables attackers to inject malicious SQL code by crafting encrypted payloads and submitting them to the <code>/api/stl/actions/dynamic</code> endpoint. Successful exploitation can lead to unauthorized access to the database, disclosure of sensitive information, authentication bypass, modification of data, or even complete compromise of the database. This vulnerability poses a significant risk to organizations using the affected SSCMS version, potentially leading to severe data breaches and system disruption.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an SSCMS v7.4.0 instance.</li>
<li>The attacker crafts a malicious SQL injection payload, specifically targeting the <code>queryString</code> attribute within the <code>stl:sqlContent</code> tag.</li>
<li>The attacker encrypts the crafted SQL injection payload.</li>
<li>The attacker sends the encrypted payload to the <code>/api/stl/actions/dynamic</code> endpoint using an HTTP POST request.</li>
<li>The SSCMS application receives the request and processes the <code>stl:sqlContent</code> tag without proper sanitization.</li>
<li>The application executes the attacker-controlled SQL query against the database.</li>
<li>The attacker gains unauthorized access to the database, potentially extracting sensitive data or modifying existing records.</li>
<li>The attacker may escalate privileges or move laterally within the compromised system, depending on the level of access gained.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to severe consequences. An attacker could gain complete control over the SSCMS database, potentially exposing sensitive user data, confidential business information, or proprietary intellectual property. Data breaches resulting from this vulnerability could lead to significant financial losses, reputational damage, and legal liabilities. The lack of specifics about victim count or sectors targeted makes quantification difficult, but the potential impact is high for any organization using the affected software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for SSCMS v7.4.0 to address the SQL injection vulnerability described in CVE-2026-7435.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection attacks, specifically focusing on the <code>queryString</code> attribute of the <code>stl:sqlContent</code> tag.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious SSCMS stl:sqlContent Requests</code> to identify potential exploitation attempts targeting the <code>/api/stl/actions/dynamic</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-7435</category><category>web-application</category></item><item><title>Multiple Vulnerabilities in MISP Threat Intelligence Platform</title><link>https://feed.craftedsignal.io/briefs/2026-04-misp-vulns/</link><pubDate>Thu, 30 Apr 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-misp-vulns/</guid><description>Multiple vulnerabilities in MISP versions prior to 2.5.37 allow attackers to perform privilege escalation, SQL injection (SQLi), and security policy bypass.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been discovered in MISP (Malware Information Sharing Platform and Threat Sharing) versions prior to 2.5.37. These flaws could allow a remote attacker to perform a variety of malicious actions, including escalating privileges to gain unauthorized access, injecting SQL code to potentially read or modify database contents, and bypassing existing security policies to execute restricted operations. These vulnerabilities pose a significant risk to organizations using MISP for threat intelligence, potentially leading to data breaches, unauthorized access to sensitive information, or disruption of threat intelligence operations. Users should upgrade to version 2.5.37 or later as soon as possible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable MISP instance running a version prior to 2.5.37.</li>
<li>The attacker crafts a malicious SQL injection payload designed to exploit a SQLi vulnerability within the MISP application, potentially targeting input fields or API endpoints.</li>
<li>The attacker sends the crafted SQL injection payload to the vulnerable MISP instance through a web request or API call.</li>
<li>The MISP application improperly processes the malicious SQL payload, leading to the execution of attacker-controlled SQL commands against the underlying database.</li>
<li>The attacker exploits a privilege escalation vulnerability to gain elevated privileges within the MISP application, potentially bypassing access controls.</li>
<li>The attacker leverages the security policy bypass vulnerability to circumvent security restrictions and execute unauthorized actions within the MISP system.</li>
<li>The attacker gains unauthorized access to sensitive data stored within the MISP instance, such as threat intelligence reports, indicators of compromise (IOCs), or user credentials.</li>
<li>The attacker exfiltrates the stolen data or uses the compromised system to launch further attacks against other systems or organizations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow an attacker to gain unauthorized access to sensitive threat intelligence data stored within MISP, potentially impacting organizations relying on MISP for security operations. An attacker could steal sensitive data, modify existing intelligence, or inject false information, impacting trust in the platform. While the number of victims is not specified in the report, any organization using a vulnerable version of MISP is at risk. The severity of impact would depend on the sensitivity of the data stored within the compromised MISP instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade MISP to version 2.5.37 or later to remediate the vulnerabilities as per the vendor&rsquo;s security bulletin.</li>
<li>Deploy web application firewall (WAF) rules to detect and block SQL injection attempts targeting MISP, mitigating potential SQLi exploitation.</li>
<li>Monitor MISP logs (category <code>webserver</code>, product <code>linux</code>) for suspicious activity, such as unexpected SQL errors or unauthorized access attempts, to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>misp</category><category>vulnerability</category><category>sqli</category><category>privilege-escalation</category><category>security-policy-bypass</category></item><item><title>ProFTPD SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-proftpd-sqli/</link><pubDate>Wed, 29 Apr 2026 09:54:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-proftpd-sqli/</guid><description>An anonymous remote attacker can exploit a SQL injection vulnerability in ProFTPD.</description><content:encoded><![CDATA[<p>A vulnerability in ProFTPD allows for SQL injection attacks by remote, unauthenticated attackers. The specific flaw and version number are not mentioned in the source, but the generic report indicates a potentially widespread issue affecting publicly accessible ProFTPD servers. Successful exploitation could lead to unauthorized data access, modification, or potentially complete system compromise depending on the database permissions configured for ProFTPD. Defenders should apply all available security patches for ProFTPD.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a ProFTPD server exposed to the internet.</li>
<li>Attacker crafts a malicious SQL injection payload.</li>
<li>Attacker sends the crafted SQL injection payload through a ProFTPD command or parameter.</li>
<li>ProFTPD processes the malicious payload without proper sanitization.</li>
<li>The payload is passed to the underlying database server.</li>
<li>The database executes the injected SQL command.</li>
<li>The attacker retrieves sensitive data or modifies database records.</li>
<li>Attacker may use the gained access to further compromise the server or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SQL injection vulnerability in ProFTPD allows unauthorized access to the underlying database. This can lead to the disclosure of sensitive information, modification of data, or even complete database compromise. The number of victims and sectors targeted are currently unknown, but public-facing ProFTPD servers are at risk. A successful attack could lead to significant data breaches, service disruption, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security patches for ProFTPD as soon as they are available to remediate SQL injection vulnerabilities.</li>
<li>Monitor ProFTPD logs for suspicious activity and SQL injection attempts (see Sigma rule below).</li>
<li>Implement proper input validation and sanitization techniques to prevent SQL injection vulnerabilities in ProFTPD configurations.</li>
<li>Review database access permissions for the ProFTPD user to minimize the impact of potential SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>proftpd</category><category>linux</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-pharmacy-sqli/</link><pubDate>Tue, 28 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pharmacy-sqli/</guid><description>A remote SQL injection vulnerability exists in SourceCodester Pharmacy Sales and Inventory System 1.0 via manipulation of the ID parameter in the /ajax.php?action=delete_category endpoint, potentially leading to unauthorized data access or modification.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in SourceCodester Pharmacy Sales and Inventory System version 1.0. The vulnerability resides within the <code>/ajax.php?action=delete_category</code> endpoint, where a manipulation of the <code>ID</code> argument can lead to arbitrary SQL command execution. This allows remote attackers to potentially bypass authentication, access sensitive data, modify database contents, or even compromise the entire system. Given the availability of a published exploit, this vulnerability poses a significant risk to organizations utilizing the affected software. Successful exploitation requires no authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of SourceCodester Pharmacy Sales and Inventory System 1.0.</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>/ajax.php?action=delete_category</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>ID</code> parameter of the request.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL code to the database.</li>
<li>The database executes the attacker-controlled SQL query.</li>
<li>Depending on the injected SQL, the attacker can read sensitive data from the database (e.g., user credentials, financial records).</li>
<li>The attacker could also modify data, such as altering inventory levels or creating unauthorized accounts.</li>
<li>Ultimately, the attacker could gain full control of the database and the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could result in unauthorized access to sensitive patient data, financial records, and other confidential information stored within the Pharmacy Sales and Inventory System database. Attackers could potentially modify data, leading to incorrect inventory levels, fraudulent transactions, or even complete system compromise. This could result in significant financial losses, reputational damage, and legal repercussions for affected organizations. Given that the exploit is public, organizations using this software are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>ID</code> parameter within the <code>/ajax.php?action=delete_category</code> endpoint to prevent SQL injection (reference CVE-2026-7130).</li>
<li>Deploy the provided Sigma rule to detect suspicious requests to the <code>/ajax.php?action=delete_category</code> endpoint containing potential SQL injection attempts.</li>
<li>Implement regular security audits and penetration testing to identify and remediate vulnerabilities in web applications.</li>
<li>Restrict database access privileges to the minimum necessary for each user and application to limit the potential impact of a successful SQL injection attack.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>cve-2026-7130</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-pharmacy-sales-sqli/</link><pubDate>Mon, 27 Apr 2026 06:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pharmacy-sales-sqli/</guid><description>SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to SQL injection by manipulating the ID argument in the /ajax.php?action=save_receiving file, allowing remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>SourceCodester Pharmacy Sales and Inventory System version 1.0 is susceptible to SQL injection. The vulnerability resides in the <code>/ajax.php?action=save_receiving</code> file, where manipulation of the <code>ID</code> argument can lead to arbitrary SQL command execution. This vulnerability allows remote attackers to compromise the application&rsquo;s database. The exploit is publicly available, increasing the risk of exploitation. This vulnerability allows attackers to read, modify, or delete sensitive data, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of SourceCodester Pharmacy Sales and Inventory System version 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/ajax.php?action=save_receiving</code> endpoint.</li>
<li>The attacker injects a SQL payload into the <code>ID</code> parameter of the request.</li>
<li>The web server processes the request and passes the injected SQL query to the database.</li>
<li>The database executes the malicious SQL query, potentially returning sensitive data to the attacker.</li>
<li>The attacker may use the SQL injection to bypass authentication, allowing them to access administrative functions.</li>
<li>The attacker may use the SQL injection to modify inventory data, manipulate sales records, or create fraudulent transactions.</li>
<li>The attacker may use the SQL injection to exfiltrate sensitive data such as customer information, financial records, and administrator credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to unauthorized access to sensitive data, modification of inventory and sales records, and potentially full control of the application and underlying server. This could result in financial loss, reputational damage, and legal repercussions for affected organizations. Given the public availability of the exploit, the risk of widespread exploitation is high. The impact could include data breaches, financial fraud, and complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detecting SQL Injection Attempts via URI</code> to identify malicious requests targeting the vulnerable endpoint.</li>
<li>Apply input validation and sanitization to the <code>ID</code> parameter in the <code>/ajax.php?action=save_receiving</code> file to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious activity, such as error messages or unusual requests targeting the <code>/ajax.php?action=save_receiving</code> endpoint (webserver log source).</li>
<li>Upgrade to a patched version of the application or implement a web application firewall (WAF) rule to block malicious requests.</li>
<li>Implement least privilege principles for database access to limit the impact of successful SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>cve-2026-7088</category></item><item><title>code-projects Employee Management System SQL Injection Vulnerability (CVE-2026-7063)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ems-sqli/</link><pubDate>Sun, 26 Apr 2026 23:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ems-sqli/</guid><description>CVE-2026-7063 is a SQL Injection vulnerability in code-projects Employee Management System 1.0 via the 'pwd' parameter in /370project/process/eprocess.php, enabling remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-7063, has been discovered in code-projects Employee Management System version 1.0. The vulnerability resides within the <code>/370project/process/eprocess.php</code> file, specifically affecting the <code>pwd</code> argument. Successful exploitation allows a remote attacker to inject and execute arbitrary SQL commands against the application&rsquo;s database. Given that the exploit is publicly available, organizations using this system are at immediate risk of unauthorized data access, modification, or deletion. The affected component is the endpoint processing user input, making it a critical point of failure if not properly secured. This vulnerability poses a significant threat due to its ease of exploitation and potential for widespread data compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of code-projects Employee Management System 1.0 accessible over the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/370project/process/eprocess.php</code> endpoint.</li>
<li>Within the HTTP request, the attacker manipulates the <code>pwd</code> parameter, injecting SQL code within the parameter&rsquo;s value.</li>
<li>The server-side code improperly sanitizes or validates the injected SQL code within the <code>pwd</code> parameter.</li>
<li>The application executes the attacker-controlled SQL query against the database.</li>
<li>The attacker bypasses authentication or gains elevated privileges through the successful SQL injection.</li>
<li>The attacker extracts sensitive data from the database, such as user credentials or financial records.</li>
<li>The attacker may modify or delete data within the database, leading to data corruption or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7063) can lead to complete compromise of the affected Employee Management System. An attacker can gain unauthorized access to sensitive employee data, including personal information, salaries, and performance reviews. The attacker could modify or delete critical data, disrupt business operations, or use the compromised system as a launchpad for further attacks within the organization&rsquo;s network. Given the public availability of the exploit, organizations failing to address this vulnerability are at a high risk of experiencing a data breach and associated financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious POST requests to <code>/370project/process/eprocess.php</code> containing SQL syntax in the <code>pwd</code> parameter to identify potential exploitation attempts.</li>
<li>Deploy the provided Sigma rule to detect exploitation attempts targeting the vulnerable <code>pwd</code> parameter in the <code>eprocess.php</code> file.</li>
<li>Apply input validation and sanitization to the <code>pwd</code> parameter in <code>/370project/process/eprocess.php</code> to prevent SQL injection, addressing CVE-2026-7063.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-7063</category><category>web-application</category></item><item><title>Multiple Vulnerabilities in n8n Workflow Automation Tool</title><link>https://feed.craftedsignal.io/briefs/2026-04-n8n-multiple-vulnerabilities/</link><pubDate>Thu, 23 Apr 2026 10:23:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-n8n-multiple-vulnerabilities/</guid><description>Multiple vulnerabilities in n8n can be exploited by an attacker to execute arbitrary code, bypass security measures, disclose sensitive information, conduct SQL injection attacks, cause denial-of-service, perform cross-site scripting, redirect users, or hijack sessions.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in n8n, a workflow automation tool. An attacker exploiting these vulnerabilities could achieve a range of malicious outcomes, including remote code execution, security bypass, information disclosure, SQL injection, denial-of-service, cross-site scripting (XSS), malicious redirection, and session hijacking. The vulnerabilities stem from insufficient input validation, insecure configurations, or design flaws within the n8n application. Successful exploitation can lead to complete compromise of the n8n instance and potentially the underlying system, depending on the permissions of the n8n process. This poses a significant risk to organizations relying on n8n for critical business processes. Defenders need to implement robust security measures to mitigate these risks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Given the broad range of potential vulnerabilities, a generalized attack chain is outlined below:</p>
<ol>
<li><strong>Reconnaissance:</strong> The attacker identifies a vulnerable n8n instance, potentially through Shodan or similar tools.</li>
<li><strong>Vulnerability Identification:</strong> The attacker probes the n8n instance to identify specific exploitable vulnerabilities, such as those related to SQL injection or XSS.</li>
<li><strong>Exploitation (SQL Injection):</strong> The attacker crafts malicious SQL queries through user input fields or API calls to extract sensitive data from the n8n database, such as user credentials or API keys.</li>
<li><strong>Exploitation (XSS):</strong> The attacker injects malicious JavaScript code into n8n workflows or data fields. When other users interact with the affected workflows or data, the JavaScript code executes in their browsers.</li>
<li><strong>Privilege Escalation/Lateral Movement:</strong> The attacker leverages the compromised credentials or XSS vulnerabilities to gain elevated privileges within the n8n instance or move laterally to other systems within the network.</li>
<li><strong>Remote Code Execution:</strong> The attacker exploits a vulnerability that allows for the execution of arbitrary code on the server. This could be achieved through insecure file uploads, deserialization flaws, or command injection.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by creating new n8n workflows or modifying existing ones to execute malicious code on a recurring basis.</li>
<li><strong>Impact:</strong> The attacker exfiltrates sensitive data, disrupts critical business processes by manipulating or deleting workflows, or uses the compromised system as a foothold for further attacks within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could result in significant damage, depending on the attacker&rsquo;s objectives. The potential impact includes data breaches, financial losses, service disruptions, and reputational damage. If sensitive data is exfiltrated, it could be used for identity theft, fraud, or other malicious purposes. Disruption of critical workflows can lead to business downtime and lost productivity. The lack of specific victim counts or sector targeting in the source data makes it difficult to quantify the impact precisely, but the broad range of potential vulnerabilities and their potential consequences warrant immediate attention.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rules to detect potential exploitation attempts targeting n8n instances (see &ldquo;Descriptive Detection Rule Name&rdquo; in the <code>rules</code> section).</li>
<li>Conduct regular security audits and penetration testing of n8n instances to identify and remediate vulnerabilities before they can be exploited.</li>
<li>Enforce strict input validation and sanitization measures to prevent SQL injection and XSS attacks.</li>
<li>Apply the principle of least privilege to limit the permissions of the n8n process and users.</li>
<li>Monitor network traffic for suspicious activity related to n8n instances, such as unusual API calls or connections to malicious domains.</li>
<li>Regularly review and update n8n workflows to ensure they are secure and do not contain any malicious code.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>n8n</category><category>vulnerability</category><category>sqli</category><category>xss</category><category>rce</category><category>session-hijacking</category></item><item><title>Dagster SQL Injection Vulnerability in Dynamic Partition Keys</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-dagster-sqli/</link><pubDate>Sat, 18 Apr 2026 01:07:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-dagster-sqli/</guid><description>A SQL injection vulnerability exists in Dagster's DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers, where a user with 'Add Dynamic Partitions' permission can inject arbitrary SQL due to improper escaping of dynamic partition key values, leading to unauthorized data access or modification.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in Dagster&rsquo;s I/O managers for DuckDB, Snowflake, BigQuery, and DeltaLake. The vulnerability stems from the construction of SQL WHERE clauses where dynamic partition key values are interpolated into queries without proper escaping. This allows an attacker with the <code>Add Dynamic Partitions</code> permission to inject arbitrary SQL code. The injected SQL would then execute against the target database backend using the I/O manager&rsquo;s credentials. This issue affects Dagster OSS versions up to 1.13.0, and dagster-* package versions up to 0.29.0. This vulnerability is most relevant when the <code>Add Dynamic Partitions</code> permission is granted independently of broader database access, such as in multi-tenant or custom RBAC configurations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to the Dagster API with the <code>Add Dynamic Partitions</code> permission. This could be through compromised credentials or a misconfigured RBAC setup.</li>
<li>The attacker crafts a malicious dynamic partition key containing SQL injection payloads.</li>
<li>The attacker uses the Dagster API to create a new dynamic partition or modify an existing one, injecting the malicious key.</li>
<li>A Dagster pipeline or asset execution is triggered that utilizes the dynamic partitions functionality and the vulnerable I/O manager.</li>
<li>When the I/O manager constructs the SQL query, the malicious partition key is interpolated without proper escaping.</li>
<li>The injected SQL code is executed against the target database (DuckDB, Snowflake, BigQuery, or DeltaLake) using the I/O manager&rsquo;s credentials.</li>
<li>The attacker can read sensitive data, modify existing data, or potentially escalate privileges within the database.</li>
<li>The attacker achieves their final objective, such as exfiltrating data or compromising the database&rsquo;s integrity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to unauthorized access and modification of data within the affected databases. The impact is particularly high in deployments where the <code>Add Dynamic Partitions</code> permission is granted to users without broader database access. This vulnerability could allow attackers to bypass intended access controls and potentially gain full control of the database, leading to data breaches, data corruption, or denial of service. The number of affected deployments is currently unknown, but organizations using Dagster with dynamic partitions should assess their exposure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all <code>dagster-*</code> packages (dagster-duckdb, dagster-snowflake, dagster-gcp, dagster-deltalake, dagster-snowflake-polars) to versions greater than 0.29.0 and <code>dagster</code> package to versions greater than 1.13.0 as outlined in the advisory to remediate the vulnerability.</li>
<li>Review user roles and permissions within Dagster, specifically focusing on who has the <code>Add Dynamic Partitions</code> permission, and restrict access to only trusted users to reduce the attack surface.</li>
<li>Monitor Dagster logs for suspicious API requests related to the creation or modification of dynamic partitions to detect potential exploitation attempts.</li>
<li>Implement database auditing to track SQL queries executed by the I/O manager and identify potential SQL injection attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>dagster</category><category>injection</category></item><item><title>ManageEngine PAM360 and Password Manager Pro Authenticated SQL Injection Vulnerability (CVE-2026-5785)</title><link>https://feed.craftedsignal.io/briefs/2026-04-manageengine-sqli/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-manageengine-sqli/</guid><description>An authenticated SQL injection vulnerability (CVE-2026-5785) in the query report module of Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Manager Pro versions from 8600 to 13230 allows attackers with low privileges to potentially read or modify sensitive database information.</description><content:encoded><![CDATA[<p>Zohocorp ManageEngine PAM360 and Password Manager Pro are affected by an authenticated SQL injection vulnerability within the query report module. This vulnerability, identified as CVE-2026-5785, impacts PAM360 versions prior to 8531 and Password Manager Pro versions ranging from 8600 to 13230. An attacker with valid, albeit low-privileged, credentials can exploit this flaw by injecting malicious SQL queries through the affected module. Successful exploitation could lead to unauthorized data access, modification, or even complete database compromise. Defenders must apply the necessary patches to remediate this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains valid, low-privileged credentials to ManageEngine PAM360 or Password Manager Pro application.</li>
<li>Attacker authenticates to the ManageEngine application with the obtained credentials.</li>
<li>Attacker navigates to the &ldquo;query report&rdquo; module within the application&rsquo;s interface.</li>
<li>Attacker crafts a malicious SQL query containing SQL injection payloads within report generation parameters.</li>
<li>The application processes the crafted SQL query without proper sanitization, executing the injected SQL commands.</li>
<li>The database executes the malicious SQL query, leading to unintended data retrieval (exfiltration) or modification.</li>
<li>Attacker extracts sensitive information like usernames, passwords, or configuration details from the database.</li>
<li>Attacker may further exploit the SQL injection to modify database records, escalate privileges, or compromise other application functionalities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5785 can result in significant data breaches and compromise of sensitive assets managed by ManageEngine PAM360 and Password Manager Pro. An attacker could potentially gain unauthorized access to credentials, configuration settings, and other critical information stored within the database. The impact can range from data theft and service disruption to complete system compromise, potentially affecting hundreds of organizations relying on these products for privileged access management.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade ManageEngine PAM360 to version 8531 or later to patch CVE-2026-5785.</li>
<li>Immediately upgrade ManageEngine Password Manager Pro to a version later than 13230, or a version earlier than 8600.</li>
<li>Monitor web server logs for suspicious SQL syntax or unusual database query patterns related to the query report module using the provided Sigma rule.</li>
<li>Implement input validation and sanitization measures within the ManageEngine application to prevent SQL injection attacks.</li>
<li>Enable database auditing to detect and investigate any unauthorized database access or modification attempts stemming from CVE-2026-5785.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-5785</category><category>sqli</category><category>manageengine</category><category>pam360</category><category>passwordmanagerpro</category></item><item><title>Riaxe Product Customizer WordPress Plugin SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-sqli/</link><pubDate>Thu, 16 Apr 2026 06:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-sqli/</guid><description>The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter within 'product_data' of the `/wp-json/InkXEProductDesignerLite/add-item-to-cart` REST API endpoint, allowing unauthenticated attackers to extract sensitive information from the database.</description><content:encoded><![CDATA[<p>The Riaxe Product Customizer plugin, a WordPress plugin, is susceptible to SQL Injection attacks. This vulnerability resides within the <code>/wp-json/InkXEProductDesignerLite/add-item-to-cart</code> REST API endpoint, specifically through the &lsquo;options&rsquo; parameter keys nested within the &lsquo;product_data&rsquo;. All versions of the plugin up to and including 2.1.2 are affected. Due to insufficient input sanitization and inadequate preparation of SQL queries, unauthenticated attackers can inject malicious SQL code. Successful exploitation enables attackers to execute arbitrary SQL queries, potentially leading to sensitive data extraction. This poses a significant risk to WordPress sites utilizing the affected plugin, as attackers could gain access to user credentials, financial information, or other confidential data stored in the database. Defenders should prioritize patching or removing the plugin to mitigate this threat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using a vulnerable version (&lt;=2.1.2) of the Riaxe Product Customizer plugin.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/wp-json/InkXEProductDesignerLite/add-item-to-cart</code> REST API endpoint.</li>
<li>The crafted request includes a &lsquo;product_data&rsquo; parameter containing a manipulated &lsquo;options&rsquo; array.</li>
<li>Within the &lsquo;options&rsquo; array, the attacker injects SQL code into one or more of the parameter keys.</li>
<li>The WordPress server processes the request without properly sanitizing the injected SQL code.</li>
<li>The application constructs a SQL query using the unsanitized input, effectively injecting the malicious code into the query.</li>
<li>The database server executes the attacker-controlled SQL query.</li>
<li>The attacker extracts sensitive information from the database, such as user credentials, by using the SQL injection vulnerability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-3599) allows unauthenticated attackers to extract sensitive information from the WordPress database. This may include user credentials (usernames, email addresses, and password hashes), customer data, financial information, and other confidential data stored within the database. The impact can range from defacement of the website and data theft, to complete compromise of the WordPress site and its associated server. Due to the widespread use of WordPress and its plugins, this vulnerability poses a significant threat to a potentially large number of websites.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Riaxe Product Customizer plugin to a version higher than 2.1.2 to patch CVE-2026-3599.</li>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempts via Riaxe Product Customizer Plugin</code> to your SIEM to detect exploitation attempts.</li>
<li>Monitor web server logs for suspicious POST requests to the <code>/wp-json/InkXEProductDesignerLite/add-item-to-cart</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>sqli</category><category>plugin</category></item><item><title>manikandan580 School-management-system SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-school-management-sqli/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-school-management-sqli/</guid><description>A time-based blind SQL injection vulnerability in manikandan580 School-management-system 1.0 allows unauthenticated attackers to potentially execute arbitrary SQL queries and gain unauthorized access to sensitive information.</description><content:encoded><![CDATA[<p>A critical time-based blind SQL injection vulnerability, identified as CVE-2025-65135, affects version 1.0 of the manikandan580 School-management-system. This vulnerability resides in the <code>/studentms/admin/between-date-reprtsdetails.php</code> script and is exploitable through the <code>fromdate</code> POST parameter. Given the nature of the vulnerability, attackers can potentially bypass authentication and execute arbitrary SQL queries on the back-end database. Successful exploitation could lead to unauthorized access to sensitive student data, administrative credentials, and other confidential information managed by the school system. This vulnerability poses a significant risk to educational institutions utilizing the affected software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the <code>/studentms/admin/between-date-reprtsdetails.php</code> endpoint.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/studentms/admin/between-date-reprtsdetails.php</code> endpoint.</li>
<li>The POST request includes a manipulated <code>fromdate</code> parameter containing a time-based blind SQL injection payload (e.g., <code>fromdate=1' AND SLEEP(5) -- -</code>).</li>
<li>The server-side application processes the crafted SQL query without proper sanitization.</li>
<li>The injected SQL payload executes a <code>SLEEP()</code> function or equivalent based on database type, causing a delay in the server&rsquo;s response if the injected condition is true.</li>
<li>The attacker monitors the server response time to infer the results of the injected SQL query.</li>
<li>The attacker uses the blind SQL injection technique to extract sensitive data from the database, such as usernames, passwords, and student records, character by character.</li>
<li>The attacker uses the obtained credentials to gain unauthorized administrative access to the School-management-system, leading to potential data breaches and system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-65135 could result in a complete compromise of the manikandan580 School-management-system. Attackers could gain access to personally identifiable information (PII) of students, financial records, and other sensitive data. This data could be used for identity theft, financial fraud, or extortion. The vulnerable system could also be used as a launchpad for further attacks against other systems within the network. Due to the potential for widespread data breaches, this vulnerability represents a critical risk for schools and educational institutions using the affected software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates released by manikandan580 to address CVE-2025-65135.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection attacks on the <code>fromdate</code> POST parameter in <code>/studentms/admin/between-date-reprtsdetails.php</code>.</li>
<li>Deploy the Sigma rules provided in this brief to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/studentms/admin/between-date-reprtsdetails.php</code> containing SQL injection payloads.</li>
<li>Consider using a Web Application Firewall (WAF) to filter out malicious requests targeting the vulnerable application.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>cve-2025-65135</category><category>school-management-system</category><category>web-application</category></item><item><title>Fortinet FortiDDoS-F SQL Injection Vulnerability (CVE-2026-39815)</title><link>https://feed.craftedsignal.io/briefs/2026-04-fortinet-sqli/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fortinet-sqli/</guid><description>An SQL injection vulnerability (CVE-2026-39815) in Fortinet FortiDDoS-F versions 7.2.1 through 7.2.2 may allow a low-privilege attacker to execute unauthorized code or commands.</description><content:encoded><![CDATA[<p>CVE-2026-39815 is an SQL injection vulnerability affecting Fortinet FortiDDoS-F versions 7.2.1 and 7.2.2. The vulnerability stems from improper neutralization of special elements used in SQL commands. According to Fortinet, an attacker with low privileges could exploit this vulnerability to execute unauthorized code or commands. While the exact attack vector is not detailed in the provided source material, successful exploitation would allow for arbitrary code execution within the context of the FortiDDoS-F appliance. This is a high-severity vulnerability because it could lead to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the FortiDDoS-F appliance with valid low-privilege credentials.</li>
<li>Attacker crafts a malicious SQL query containing special characters designed to exploit the SQL injection vulnerability.</li>
<li>Attacker sends the crafted SQL query to the vulnerable FortiDDoS-F endpoint. (Attack Vector N/A from source)</li>
<li>The FortiDDoS-F appliance processes the malicious SQL query without proper sanitization.</li>
<li>The malicious SQL query is executed against the FortiDDoS-F database.</li>
<li>The attacker injects and executes arbitrary SQL code, potentially gaining access to sensitive data or the ability to modify system configurations.</li>
<li>The attacker leverages the injected SQL code to execute operating system commands on the FortiDDoS-F appliance.</li>
<li>The attacker escalates privileges and compromises the FortiDDoS-F system, potentially gaining complete control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-39815 can lead to unauthorized code execution, sensitive data exposure, and complete system compromise of the Fortinet FortiDDoS-F appliance. While the number of potential victims is not specified, all organizations using Fortinet FortiDDoS-F versions 7.2.1 and 7.2.2 are vulnerable. A successful attack could disrupt network operations, compromise sensitive data, and allow attackers to use the FortiDDoS-F appliance as a pivot point for further attacks within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Fortinet FortiDDoS-F installations to a patched version that addresses CVE-2026-39815.</li>
<li>Monitor FortiDDoS-F systems for suspicious activity, including unusual SQL queries, leveraging the <code>webserver</code> log source to detect anomalous HTTP requests related to potential exploitation attempts.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious FortiDDoS-F SQL Injection Attempts</code> to your SIEM to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>fortinet</category><category>cve-2026-39815</category></item><item><title>PHPGurukul Daily Expense Tracking System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-php-gurukul-sqli/</link><pubDate>Tue, 14 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-php-gurukul-sqli/</guid><description>A remote SQL injection vulnerability exists in PHPGurukul Daily Expense Tracking System 1.1 within the /register.php file, where manipulation of the email argument allows for arbitrary SQL command execution, with a public exploit available.</description><content:encoded><![CDATA[<p>A critical security flaw has been identified in PHPGurukul Daily Expense Tracking System version 1.1. This vulnerability resides in the <code>/register.php</code> file and is triggered by manipulating the <code>email</code> argument. Successful exploitation enables remote SQL injection, potentially granting attackers unauthorized access to sensitive database information or allowing them to modify data. This vulnerability, identified as CVE-2026-6193, has a CVSS v3.1 score of 7.3, indicating a high level of severity. The existence of a publicly available exploit increases the risk of widespread exploitation. Organizations using this software should take immediate action to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of PHPGurukul Daily Expense Tracking System 1.1.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/register.php</code> endpoint.</li>
<li>Within the request, the attacker injects SQL code into the <code>email</code> parameter.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL query to the database.</li>
<li>The database executes the injected SQL code, potentially allowing the attacker to read, modify, or delete data.</li>
<li>The attacker may leverage the initial SQL injection to escalate privileges within the database.</li>
<li>The attacker could potentially gain access to administrative credentials stored in the database.</li>
<li>Finally, the attacker uses the compromised credentials to gain full control over the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to severe consequences. Attackers could gain unauthorized access to sensitive user data, including usernames, passwords, and financial information. This could result in identity theft, financial fraud, and reputational damage for both the organization and its users. The attacker could also modify or delete data, disrupt the application&rsquo;s functionality, or even gain complete control of the server. Given the availability of a public exploit, the likelihood of attacks is significantly increased.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates provided by PHPGurukul to address CVE-2026-6193.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious SQL Injection Attempts in PHPGurukul Registration&rdquo; to identify exploitation attempts targeting the <code>/register.php</code> endpoint.</li>
<li>Implement input validation and sanitization measures on the <code>email</code> parameter in <code>/register.php</code> to prevent SQL injection.</li>
<li>Monitor web server logs for suspicious activity, such as unusual characters or SQL syntax in the <code>email</code> parameter, which could indicate an attempted SQL injection (webserver log source).</li>
<li>Implement a Web Application Firewall (WAF) rule to block requests containing SQL injection payloads targeting <code>/register.php</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-6193</category><category>php</category><category>web-application</category></item><item><title>SQL Injection Vulnerability in Simple Content Management System 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-04-simple-cms-sqli/</link><pubDate>Mon, 13 Apr 2026 15:17:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-simple-cms-sqli/</guid><description>A remote SQL injection vulnerability exists in code-projects Simple Content Management System 1.0, specifically affecting the /web/admin/login.php file where manipulation of the 'User' argument allows unauthenticated attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in code-projects Simple Content Management System (CMS) version 1.0. The vulnerability resides in the <code>/web/admin/login.php</code> file and stems from improper sanitization of user-supplied input within the <code>User</code> argument. An unauthenticated, remote attacker can exploit this vulnerability to inject arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. Publicly available exploits exist, increasing the risk of widespread exploitation. Given the simplicity of the targeted software, many small businesses or personal websites could be running vulnerable instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a publicly accessible instance of Simple Content Management System 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/web/admin/login.php</code> endpoint.</li>
<li>The crafted request includes a SQL injection payload within the <code>User</code> parameter.</li>
<li>The application fails to properly sanitize the input, passing the malicious payload to the database.</li>
<li>The database executes the injected SQL commands, allowing the attacker to bypass authentication.</li>
<li>The attacker gains unauthorized administrative access to the CMS.</li>
<li>The attacker modifies the CMS content or extracts sensitive data from the database.</li>
<li>The attacker may install a web shell for persistent access and further exploitation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants attackers unauthorized access to the Simple Content Management System 1.0. This can lead to sensitive data exfiltration, modification of website content (defacement), or complete takeover of the underlying server. The vulnerable software is likely used by individuals or small businesses, potentially leading to a significant impact on their online presence and data security. Given the public availability of exploits, mass exploitation is a realistic threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for requests to <code>/web/admin/login.php</code> containing suspicious characters or SQL keywords in the <code>User</code> parameter to detect potential exploitation attempts (see rule: &ldquo;Detect SQL Injection Attempts in Simple CMS Login&rdquo;).</li>
<li>Monitor web server logs for unusual database errors originating from <code>/web/admin/login.php</code>, which may indicate successful SQL injection (see rule: &ldquo;Detect Simple CMS SQL Injection Errors&rdquo;).</li>
<li>Implement input validation and sanitization on all user-supplied data, particularly within the <code>/web/admin/login.php</code> script, to prevent SQL injection attacks.</li>
<li>Organizations using code-projects Simple Content Management System 1.0 should consider migrating to a more secure platform or applying security patches if available from the vendor.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>cve-2026-6182</category></item><item><title>SQL Injection Vulnerability in Vehicle Showroom Management System 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-04-vehicle-showroom-sqli/</link><pubDate>Mon, 13 Apr 2026 06:17:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vehicle-showroom-sqli/</guid><description>A remote attacker can exploit an SQL injection vulnerability (CVE-2026-6165) in code-projects Vehicle Showroom Management System 1.0 by manipulating the ID parameter in /util/Login_check.php, potentially leading to unauthorized data access and modification.</description><content:encoded><![CDATA[<p>CVE-2026-6165 identifies an SQL injection vulnerability within the code-projects Vehicle Showroom Management System version 1.0. The vulnerability resides in the <code>/util/Login_check.php</code> file and can be exploited by manipulating the <code>ID</code> argument. Successful exploitation allows attackers to inject malicious SQL queries, potentially gaining unauthorized access to sensitive data, modifying database contents, or even executing arbitrary commands on the underlying server. As a publicly available exploit exists, the risk of exploitation is elevated, making it crucial for organizations using this software to implement mitigation measures. The scope of this vulnerability impacts any deployment of the affected Vehicle Showroom Management System version 1.0 exposed to network traffic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Vehicle Showroom Management System 1.0 instance exposed on the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/util/Login_check.php</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>ID</code> parameter of the HTTP request, bypassing input validation.</li>
<li>The web application processes the malicious SQL query without proper sanitization.</li>
<li>The injected SQL code is executed against the underlying database.</li>
<li>The attacker retrieves sensitive information from the database, such as user credentials or financial records.</li>
<li>The attacker may modify database entries, such as altering prices or inventory.</li>
<li>The attacker could potentially leverage the SQL injection to gain code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6165 can lead to a range of severe consequences. An attacker could gain unauthorized access to sensitive customer data, including personally identifiable information (PII) and financial details. Data breaches can result in significant financial losses, reputational damage, and legal liabilities. Furthermore, the ability to modify database contents could lead to manipulated sales figures, altered inventory, or even complete disruption of business operations. The vulnerability&rsquo;s potential for remote code execution poses the highest risk, allowing attackers to establish a persistent foothold within the organization&rsquo;s infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization techniques to the <code>ID</code> parameter in <code>/util/Login_check.php</code> to prevent SQL injection (CVE-2026-6165).</li>
<li>Deploy the provided Sigma rule to detect suspicious HTTP requests targeting <code>/util/Login_check.php</code> with potential SQL injection payloads.</li>
<li>Implement a web application firewall (WAF) to filter malicious traffic and block known SQL injection patterns.</li>
<li>Regularly audit and patch all software components to address known vulnerabilities.</li>
<li>Monitor web server logs for unusual activity and potential signs of exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>cve-2026-6165</category></item><item><title>Dolibarr ERP-CRM 8.0.4 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dolibarr-sqli/</link><pubDate>Sun, 12 Apr 2026 13:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dolibarr-sqli/</guid><description>Dolibarr ERP-CRM 8.0.4 is vulnerable to SQL injection via the rowid parameter in the admin dict.php endpoint, allowing attackers to execute arbitrary SQL queries and extract sensitive database information.</description><content:encoded><![CDATA[<p>Dolibarr ERP-CRM is a popular open-source enterprise resource planning and customer relationship management software. Version 8.0.4 of Dolibarr is susceptible to a critical SQL injection vulnerability (CVE-2019-25710) affecting the <code>rowid</code> parameter in the <code>admin dict.php</code> endpoint. This flaw allows unauthenticated attackers to inject malicious SQL code through the <code>rowid</code> POST parameter. Successful exploitation enables attackers to execute arbitrary SQL queries against the Dolibarr database, potentially leading to the exposure of sensitive information, modification of data, or complete compromise of the application. This vulnerability can be exploited using error-based SQL injection techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Dolibarr ERP-CRM instance running version 8.0.4.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>admin/dict.php</code> endpoint.</li>
<li>The request includes the <code>rowid</code> parameter containing a SQL injection payload.</li>
<li>The server-side application processes the request and executes the injected SQL code within the database query.</li>
<li>The attacker leverages error-based SQL injection techniques to extract sensitive information from the database, such as user credentials, API keys, or financial data.</li>
<li>The attacker analyzes the error messages returned by the application to refine the SQL injection payload and bypass any security measures.</li>
<li>The attacker potentially uses the extracted credentials to gain unauthorized access to other parts of the application or the underlying system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to severe consequences, including unauthorized access to sensitive data, data breaches, and complete compromise of the Dolibarr ERP-CRM system. The vulnerability allows attackers to extract sensitive database information, modify data, or potentially execute arbitrary code on the server. Given that ERP and CRM systems often contain critical business data, the impact can be significant for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patches or upgrade to a secure version of Dolibarr ERP-CRM to remediate CVE-2019-25710.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Dolibarr rowid Parameter SQL Injection Attempt</code> to your SIEM to identify potential exploitation attempts against the <code>admin/dict.php</code> endpoint.</li>
<li>Monitor web server logs for unusual POST requests to <code>admin/dict.php</code> with suspicious characters or SQL keywords in the <code>rowid</code> parameter to detect potential attacks.</li>
<li>Implement web application firewall (WAF) rules to filter out malicious SQL injection payloads targeting the <code>rowid</code> parameter in <code>admin/dict.php</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2019-25710</category><category>dolibarr</category><category>web-application</category></item><item><title>ImpressCMS 1.3.11 Time-Based Blind SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-impresscms-sqli/</link><pubDate>Sun, 12 Apr 2026 13:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-impresscms-sqli/</guid><description>ImpressCMS 1.3.11 contains a time-based blind SQL injection vulnerability allowing authenticated attackers to manipulate database queries by injecting SQL code through the 'bid' parameter via POST requests to the admin.php endpoint.</description><content:encoded><![CDATA[<p>ImpressCMS is an open-source content management system. Version 1.3.11 is vulnerable to a time-based blind SQL injection vulnerability (CVE-2019-25703). An authenticated attacker can exploit this vulnerability by injecting malicious SQL code into the &lsquo;bid&rsquo; parameter. Successful exploitation allows the attacker to manipulate database queries, potentially leading to the extraction of sensitive information. This vulnerability requires authentication, limiting the scope of potential attackers, but the impact can be severe if exploited successfully. The vulnerability was reported and disclosed in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the ImpressCMS application with valid credentials.</li>
<li>The attacker crafts a malicious POST request targeting the <code>admin.php</code> endpoint.</li>
<li>The POST request includes the <code>bid</code> parameter containing SQL injection payload designed to cause a time delay.</li>
<li>The ImpressCMS application processes the POST request without proper sanitization of the <code>bid</code> parameter.</li>
<li>The injected SQL code is executed against the underlying database, causing a time-based delay.</li>
<li>The attacker monitors the response time to confirm successful injection.</li>
<li>The attacker refines the SQL injection payload to extract sensitive information from the database using techniques like <code>SLEEP()</code> and conditional queries.</li>
<li>The attacker exfiltrates the sensitive data obtained from the database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to read sensitive data from the ImpressCMS database. This may include user credentials, configuration details, and other confidential information. While the exploit requires authentication, a successful attack could lead to complete compromise of the application and its data, potentially impacting all users and the integrity of the website. The CVSS v3.1 score of 7.1 reflects the high potential impact of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary patches or upgrade to a version of ImpressCMS that addresses CVE-2019-25703 to remediate the SQL injection vulnerability.</li>
<li>Deploy the provided Sigma rule to detect malicious POST requests containing SQL injection attempts targeting the <code>admin.php</code> endpoint.</li>
<li>Implement input validation and sanitization on the <code>bid</code> parameter within the ImpressCMS application to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious POST requests to <code>admin.php</code> with unusual parameters, as this can be an indicator of exploitation attempts.</li>
<li>Review and restrict access to the <code>admin.php</code> endpoint to only authorized users to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>impresscms</category><category>cve-2019-25703</category></item><item><title>CMSsite 1.0 SQL Injection Vulnerability (CVE-2019-25697)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cmssite-sqli/</link><pubDate>Sun, 12 Apr 2026 13:16:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cmssite-sqli/</guid><description>CMSsite 1.0 is vulnerable to unauthenticated SQL injection (CVE-2019-25697) via the cat_id parameter in category.php, allowing attackers to extract sensitive database information.</description><content:encoded><![CDATA[<p>CMSsite 1.0 is susceptible to an SQL injection vulnerability (CVE-2019-25697) within the category.php script. This flaw allows unauthenticated, remote attackers to inject arbitrary SQL commands by manipulating the <code>cat_id</code> GET parameter. Successful exploitation could lead to the disclosure of sensitive information stored within the database, including user credentials and other application data. Given the ease of exploitation and the potential impact, this vulnerability poses a significant risk to organizations using the affected CMSsite version. The vulnerability was reported to NVD and assigned a CVSS v3.1 score of 8.2, indicating high severity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a CMSsite 1.0 installation.</li>
<li>The attacker crafts a malicious HTTP GET request targeting <code>category.php</code>.</li>
<li>The attacker injects SQL code into the <code>cat_id</code> parameter of the GET request, for example: <code>category.php?cat_id=1' OR '1'='1</code>.</li>
<li>The web server processes the request and passes the tainted <code>cat_id</code> value to the underlying SQL database.</li>
<li>The injected SQL code manipulates the database query, potentially bypassing intended security checks.</li>
<li>The database executes the modified query, returning sensitive data to the web server.</li>
<li>The web server includes the extracted data in the HTTP response.</li>
<li>The attacker parses the HTTP response to extract sensitive information such as usernames, passwords, or other confidential data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows an unauthenticated attacker to read sensitive information from the CMSsite 1.0 database. This can lead to complete compromise of the application, including unauthorized access to user accounts, exposure of confidential data, and potential further attacks on the underlying system. Given the lack of required authentication, any CMSsite 1.0 instance exposed to the internet is a potential target.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to the <code>cat_id</code> parameter in <code>category.php</code> to prevent SQL injection.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious GET Requests to category.php with SQL Injection Attempts&rdquo; to identify exploitation attempts in web server logs.</li>
<li>Restrict database access privileges to the minimum necessary for the application to function.</li>
<li>Consider upgrading to a more secure CMS solution or applying a patch if one becomes available.</li>
<li>Enable web server logging and monitor for unusual activity, paying close attention to GET requests targeting <code>category.php</code>.</li>
<li>Implement parameterized queries or prepared statements to prevent SQL injection vulnerabilities when interacting with the database.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2019-25697</category><category>webserver</category></item><item><title>SQL Injection Vulnerability in Vehicle Showroom Management System 1.0 (CVE-2026-6036)</title><link>https://feed.craftedsignal.io/briefs/2026-04-vehicleshowroom-sqli/</link><pubDate>Fri, 10 Apr 2026 09:16:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vehicleshowroom-sqli/</guid><description>A remote SQL injection vulnerability (CVE-2026-6036) exists in the Vehicle Showroom Management System 1.0 due to improper sanitization of the VEHICLE_ID parameter in /util/VehicleDetailsFunction.php, potentially allowing attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>CVE-2026-6036 is a SQL injection vulnerability affecting Vehicle Showroom Management System version 1.0. The vulnerability resides within the <code>/util/VehicleDetailsFunction.php</code> file, specifically involving the <code>VEHICLE_ID</code> parameter. An unauthenticated attacker can remotely exploit this vulnerability by injecting malicious SQL code into the <code>VEHICLE_ID</code> argument. This allows for the potential execution of arbitrary SQL commands on the underlying database, potentially leading to data breaches, modification, or complete system compromise. A public exploit exists, increasing the likelihood of exploitation. The vulnerable software is commonly used for managing vehicle inventory and showroom operations, making organizations that rely on this software potential targets.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Vehicle Showroom Management System 1.0 instance exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/util/VehicleDetailsFunction.php</code>.</li>
<li>The request includes a modified <code>VEHICLE_ID</code> parameter containing SQL injection payloads.</li>
<li>The application fails to properly sanitize the <code>VEHICLE_ID</code> input.</li>
<li>The unsanitized input is directly incorporated into an SQL query.</li>
<li>The injected SQL code is executed against the database.</li>
<li>The attacker retrieves sensitive information from the database, such as user credentials, vehicle details, or financial records.</li>
<li>The attacker uses the obtained credentials to gain unauthorized access to the system or exfiltrates the data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6036 allows an attacker to execute arbitrary SQL queries against the Vehicle Showroom Management System&rsquo;s database. This could lead to the disclosure of sensitive customer information, modification of vehicle inventory data, or even complete compromise of the system. The vulnerability could result in significant financial losses, reputational damage, and legal liabilities for affected organizations. While the number of affected installations is unknown, Vehicle Showroom Management Systems are commonly used by dealerships and automotive businesses, making them attractive targets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization techniques to the <code>VEHICLE_ID</code> parameter in <code>/util/VehicleDetailsFunction.php</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious SQL Injection Attempts in Vehicle Showroom Management System</code> to your SIEM and tune for your environment to detect exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests targeting <code>/util/VehicleDetailsFunction.php</code> with potentially malicious <code>VEHICLE_ID</code> parameters.</li>
<li>Consider using a Web Application Firewall (WAF) to filter out malicious requests targeting the vulnerable endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-6036</category><category>web-application</category></item><item><title>Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5827)</title><link>https://feed.craftedsignal.io/briefs/2026-04-simple-it-forum-sqli/</link><pubDate>Thu, 09 Apr 2026 01:16:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-simple-it-forum-sqli/</guid><description>CVE-2026-5827 is a SQL injection vulnerability in code-projects Simple IT Discussion Forum 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'content' argument in /question-function.php.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-5827, affects code-projects Simple IT Discussion Forum version 1.0. The vulnerability resides in the <code>/question-function.php</code> file and is triggered by manipulating the <code>content</code> argument. Successful exploitation allows a remote attacker to inject arbitrary SQL commands, potentially leading to data exfiltration, modification, or complete system compromise. This vulnerability is considered high risk due to its ease of exploitation and the sensitive nature of data often stored in forum databases. The exploit is publicly available, increasing the likelihood of widespread exploitation. Defenders should prioritize patching and implementing mitigations to prevent potential attacks against vulnerable Simple IT Discussion Forum instances.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Simple IT Discussion Forum 1.0 instance.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/question-function.php</code>.</li>
<li>The crafted request includes a SQL injection payload within the <code>content</code> argument.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL query to the database.</li>
<li>The database executes the injected SQL code.</li>
<li>The attacker can extract sensitive data, such as user credentials or forum content.</li>
<li>The attacker may modify data within the database, altering forum posts or user profiles.</li>
<li>In a worst-case scenario, the attacker gains complete control of the database server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can have severe consequences. An attacker can gain unauthorized access to sensitive data, including user credentials, private messages, and other confidential information stored within the Simple IT Discussion Forum database. This can lead to identity theft, financial fraud, and reputational damage. Furthermore, attackers can modify or delete data, disrupt forum operations, or even gain complete control of the underlying server. Given the public availability of the exploit, unpatched instances are at significant risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for code-projects Simple IT Discussion Forum 1.0 to address CVE-2026-5827.</li>
<li>Implement input validation and sanitization on the <code>/question-function.php</code> file to prevent SQL injection attacks, specifically targeting the <code>content</code> argument.</li>
<li>Deploy a web application firewall (WAF) with rules to detect and block SQL injection attempts against <code>/question-function.php</code>.</li>
<li>Monitor web server logs for suspicious activity, such as unusual characters or SQL keywords in the <code>content</code> parameter of requests to <code>/question-function.php</code>. Enable webserver logging to activate the rules below.</li>
<li>Deploy the Sigma rule to detect SQL injection attempts in web server logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>injection</category></item><item><title>WooCommerce Ajax Product Filter Plugin Vulnerable to SQL Injection (CVE-2026-3396)</title><link>https://feed.craftedsignal.io/briefs/2026-04-woocommerce-sqli/</link><pubDate>Wed, 08 Apr 2026 12:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-woocommerce-sqli/</guid><description>The WCAPF - WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection (CVE-2026-3396) due to insufficient escaping and SQL query preparation, allowing unauthenticated attackers to extract sensitive information from the database in versions up to 4.2.3.</description><content:encoded><![CDATA[<p>The WooCommerce Ajax Product Filter (WCAPF) plugin, a WordPress extension, is susceptible to a time-based SQL Injection vulnerability (CVE-2026-3396). This flaw stems from inadequate input sanitization of the <code>post-author</code> parameter and insufficient preparation within the existing SQL query structure. Specifically, all versions of the plugin up to and including version 4.2.3 are affected. An unauthenticated attacker can exploit this vulnerability by injecting malicious SQL code into the <code>post-author</code> parameter. Successful exploitation allows the attacker to manipulate database queries and extract sensitive information without requiring authentication. This vulnerability poses a significant risk to e-commerce sites using the WCAPF plugin, as attackers could potentially access customer data, administrative credentials, or other confidential information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WooCommerce website using a vulnerable version (&lt;=4.2.3) of the WCAPF plugin.</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that utilizes the vulnerable <code>post-author</code> parameter.</li>
<li>The crafted request includes SQL injection payload within the <code>post-author</code> parameter, designed to extract data using time-based techniques. For example, the attacker might use a <code>SLEEP()</code> function to introduce delays based on conditional database queries.</li>
<li>The web server processes the request and passes the unsanitized <code>post-author</code> parameter to the database query.</li>
<li>The injected SQL code manipulates the original query, causing the database to execute the attacker&rsquo;s malicious commands.</li>
<li>Based on the response time (due to the <code>SLEEP()</code> function), the attacker infers whether their injected SQL query was successful in retrieving specific data.</li>
<li>The attacker iteratively refines their SQL injection payload to extract sensitive information, such as user credentials or customer details.</li>
<li>The attacker exfiltrates the obtained data, potentially using it for identity theft, financial fraud, or further attacks against the compromised website.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3396 can lead to the complete compromise of the vulnerable WooCommerce website&rsquo;s database. An attacker could potentially access sensitive customer data, including names, addresses, credit card details, and purchase history. Furthermore, administrative credentials could be stolen, allowing the attacker to gain full control over the website. This can result in significant financial losses, reputational damage, and legal liabilities for the affected e-commerce business. While the exact number of affected websites is unknown, any online store using the WCAPF plugin versions 4.2.3 or earlier is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WCAPF plugin to a version greater than 4.2.3 to patch CVE-2026-3396 (references: CVE-2026-3396).</li>
<li>Deploy the Sigma rule <code>Detect WooCommerce SQL Injection Attempt</code> to identify potential exploitation attempts in web server logs (references: Sigma rule).</li>
<li>Implement input validation and sanitization on the <code>post-author</code> parameter to prevent SQL injection attacks (references: Attack Chain).</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads, particularly those targeting WCAPF plugin endpoints (references: Sigma rule, Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>woocommerce</category><category>sqli</category><category>cve-2026-3396</category><category>wordpress</category><category>plugin</category></item><item><title>code-projects Online FIR System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-online-fir-sqli/</link><pubDate>Mon, 06 Apr 2026 16:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-online-fir-sqli/</guid><description>A SQL injection vulnerability in code-projects Online FIR System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the email or password parameters in the /Login/checklogin.php file.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in code-projects Online FIR System version 1.0. The vulnerability resides within the <code>/Login/checklogin.php</code> file, specifically affecting the login component. An attacker can remotely exploit this vulnerability by manipulating the <code>email</code> or <code>password</code> parameters within a request. The vulnerability has been assigned CVE-2026-5665 and given a CVSS v3.1 score of 7.3, indicating a high severity. Public exploits exist, meaning defenders should prioritize detection and mitigation measures. This vulnerability poses a significant risk to organizations using the affected software, as successful exploitation could lead to data breaches, account takeover, or other unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of code-projects Online FIR System 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/Login/checklogin.php</code> endpoint.</li>
<li>The request includes SQL injection payloads within the <code>email</code> or <code>password</code> parameters.</li>
<li>The application fails to properly sanitize the input, passing the malicious payload to the database.</li>
<li>The database executes the injected SQL code, allowing the attacker to read, modify, or delete data.</li>
<li>The attacker may extract sensitive information such as user credentials or financial records.</li>
<li>The attacker could use the extracted credentials to gain unauthorized access to user accounts.</li>
<li>The attacker could escalate privileges within the system, potentially gaining full control of the application and underlying server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can have severe consequences. An attacker could gain unauthorized access to sensitive data, including user credentials, personal information, and financial records. This can lead to identity theft, financial loss, and reputational damage. The number of potential victims depends on the number of installations of the vulnerable Online FIR System. The targeted sectors are unknown, but any organization using this system is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious POST requests to <code>/Login/checklogin.php</code> containing SQL injection attempts using the provided Sigma rule.</li>
<li>Apply input validation and sanitization to the <code>email</code> and <code>password</code> parameters in <code>/Login/checklogin.php</code> to prevent SQL injection.</li>
<li>Monitor network traffic for connections to or from the known malicious URLs listed in the IOC table.</li>
<li>Consider implementing a web application firewall (WAF) rule to block known SQL injection patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-5665</category><category>web-application</category></item><item><title>GLPI SQL Injection Vulnerability (CVE-2026-29047)</title><link>https://feed.craftedsignal.io/briefs/2026-04-glpi-sqli/</link><pubDate>Mon, 06 Apr 2026 15:17:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-glpi-sqli/</guid><description>GLPI versions 10.0.0 before 10.0.24 and 11.0.6 are vulnerable to SQL Injection (CVE-2026-29047) via the logs export feature, allowing authenticated users to potentially execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>GLPI is a free asset and IT management software package.  CVE-2026-29047 affects GLPI versions 10.0.0 up to, but not including, 10.0.24, as well as version 11.0.6. An authenticated user can exploit a SQL injection vulnerability present in the logs export feature. Successful exploitation could allow an attacker to read sensitive data, modify database content, or even execute arbitrary commands on the underlying database server.  Organizations using vulnerable versions of GLPI should upgrade to versions 10.0.24 or 11.0.6 as soon as possible to mitigate the risk. This vulnerability highlights the importance of keeping software up to date with the latest security patches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid user credentials to a GLPI instance (versions 10.0.0 to 10.0.23 or 11.0.0 to 11.0.5).</li>
<li>The attacker authenticates to the GLPI web interface using the acquired credentials.</li>
<li>The attacker navigates to the &ldquo;logs export&rdquo; feature within the GLPI interface.</li>
<li>The attacker crafts a malicious SQL query and injects it into a parameter that is used when exporting the logs. This parameter is not properly sanitized.</li>
<li>The GLPI application processes the crafted SQL query without proper sanitization, leading to SQL injection.</li>
<li>The injected SQL query is executed against the GLPI database.</li>
<li>The attacker retrieves sensitive data from the database or modifies existing data.</li>
<li>The attacker escalates the attack, potentially gaining control of the underlying database server depending on database privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-29047 can lead to unauthorized access to sensitive information stored in the GLPI database, such as user credentials, asset information, and IT configuration details. An attacker could modify or delete critical data, disrupt IT operations, and potentially gain control over the entire GLPI system. This could impact all organizations utilizing the vulnerable GLPI version, potentially leading to data breaches and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade GLPI to version 10.0.24 or 11.0.6 to patch CVE-2026-29047 (references: advisory in Overview).</li>
<li>Implement database activity monitoring to detect and alert on suspicious SQL queries (references: Attack Chain step 6).</li>
<li>Review user access controls and enforce the principle of least privilege to limit the impact of compromised accounts (references: Attack Chain step 1).</li>
<li>Deploy the Sigma rule provided to detect potential exploitation attempts targeting the logs export feature (references: rules section).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>glpi</category><category>sqli</category><category>cve-2026-29047</category></item><item><title>SQL Injection Vulnerability in Car Rental Project 1.0 (CVE-2026-5634)</title><link>https://feed.craftedsignal.io/briefs/2026-04-car-rental-sqli/</link><pubDate>Mon, 06 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-car-rental-sqli/</guid><description>A remote SQL injection vulnerability (CVE-2026-5634) exists in projectworlds Car Rental Project 1.0 via the fname parameter in /book_car.php, allowing unauthenticated attackers to potentially read, modify, or delete database information.</description><content:encoded><![CDATA[<p>A publicly disclosed SQL injection vulnerability affects projectworlds Car Rental Project version 1.0. This vulnerability, identified as CVE-2026-5634, resides in the <code>/book_car.php</code> file, specifically within the parameter handler. An attacker can remotely manipulate the <code>fname</code> argument to inject arbitrary SQL commands. Given the availability of exploit code, the risk of exploitation is elevated. Successful exploitation could lead to unauthorized data access, modification, or deletion, potentially compromising the entire application and its data. Defenders need to focus on detecting and preventing malicious requests targeting the vulnerable endpoint.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the vulnerable <code>/book_car.php</code> endpoint.</li>
<li>The attacker crafts a malicious HTTP GET or POST request to <code>/book_car.php</code>, injecting SQL code into the <code>fname</code> parameter. For example, <code>fname=value' OR '1'='1</code>.</li>
<li>The web server processes the request and passes the tainted <code>fname</code> parameter to the application&rsquo;s SQL query.</li>
<li>Due to the lack of proper input sanitization, the injected SQL code is executed by the database server.</li>
<li>The attacker can leverage the SQL injection vulnerability to bypass authentication, extract sensitive data (e.g., user credentials, car availability), or modify data (e.g., alter booking information, escalate privileges).</li>
<li>The database server returns the results of the injected SQL query to the application.</li>
<li>The application displays the results to the attacker, or uses them internally to further the attack.</li>
<li>The attacker gains unauthorized access to the application&rsquo;s data and functionality, potentially leading to complete compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5634 can lead to significant data breaches, data manipulation, and service disruption. An attacker could potentially gain access to sensitive customer data, including personal information and booking details. This can result in financial losses, reputational damage, and legal liabilities for the affected organization. The number of potential victims is dependent on the user base of the affected Car Rental Project 1.0 installation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious requests containing SQL syntax within the <code>fname</code> parameter targeting <code>/book_car.php</code> to identify potential exploitation attempts.</li>
<li>Deploy the provided Sigma rule to detect attempts to exploit the SQL injection vulnerability by monitoring web server logs (cs-uri-query).</li>
<li>Apply input validation and sanitization to the <code>fname</code> parameter in <code>/book_car.php</code> to prevent SQL injection attacks.</li>
<li>Consider using a Web Application Firewall (WAF) to filter out malicious requests targeting the vulnerable endpoint.</li>
<li>Upgrade to a patched version of Car Rental Project that addresses CVE-2026-5634, if available.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>cve-2026-5634</category></item><item><title>Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25692)</title><link>https://feed.craftedsignal.io/briefs/2026-04-kados-sqli/</link><pubDate>Sun, 05 Apr 2026 21:16:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-kados-sqli/</guid><description>Kados R10 GreenBee is vulnerable to SQL injection via the 'id_to_modify' parameter, enabling attackers to manipulate database queries and potentially extract or modify sensitive data.</description><content:encoded><![CDATA[<p>Kados R10 GreenBee is susceptible to an SQL injection vulnerability (CVE-2019-25692) affecting the &lsquo;id_to_modify&rsquo; parameter. An attacker can inject malicious SQL code into this parameter through crafted HTTP requests. Successful exploitation allows the attacker to manipulate database queries, potentially leading to unauthorized data access, modification, or deletion. This vulnerability poses a significant risk to organizations using Kados R10 GreenBee, as it could compromise the confidentiality, integrity, and availability of their data. The vulnerability was reported in 2026. The scope of targeting is any system running a vulnerable version of Kados R10 GreenBee.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an endpoint in the Kados R10 GreenBee application that utilizes the &lsquo;id_to_modify&rsquo; parameter in a database query.</li>
<li>The attacker crafts a malicious HTTP request containing SQL injection payloads within the &lsquo;id_to_modify&rsquo; parameter.</li>
<li>The attacker sends the crafted HTTP request to the vulnerable Kados R10 GreenBee endpoint.</li>
<li>The Kados R10 GreenBee application fails to properly sanitize the &lsquo;id_to_modify&rsquo; parameter before incorporating it into a database query.</li>
<li>The database server executes the malicious SQL code injected by the attacker.</li>
<li>The attacker retrieves sensitive database information via SELECT queries (e.g., usernames, passwords, personal data).</li>
<li>Alternatively, the attacker modifies database records using INSERT, UPDATE, or DELETE queries, causing data corruption or unauthorized modifications.</li>
<li>The attacker may attempt to escalate privileges within the database or gain access to the underlying operating system depending on the database configuration and permissions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to a range of damaging consequences. An attacker could potentially access sensitive customer data, financial records, or proprietary information. They could also modify or delete data, leading to data corruption, service disruption, or financial loss. The number of affected systems and the potential damage depend on the deployment and data stored within the vulnerable Kados R10 GreenBee instance.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious requests targeting Kados R10 GreenBee endpoints that use the <code>id_to_modify</code> parameter, looking for SQL syntax such as <code>UNION</code>, <code>SELECT</code>, <code>UPDATE</code>, or <code>DELETE</code> (see &ldquo;Detect Suspicious SQL Injection Attempt&rdquo; Sigma rule).</li>
<li>Deploy the &ldquo;Detect SQL Injection via HTTP Request&rdquo; Sigma rule to monitor for potential SQL injection attempts based on common SQL injection payloads in HTTP requests.</li>
<li>Implement input validation and sanitization measures for all user-supplied data, especially the &lsquo;id_to_modify&rsquo; parameter, to prevent SQL injection attacks.</li>
<li>Upgrade Kados R10 GreenBee to a patched version that addresses CVE-2019-25692.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2019-25692</category><category>web-application</category></item><item><title>OpenDocMan 1.3.4 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-opendocman-sqli/</link><pubDate>Sun, 05 Apr 2026 21:16:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-opendocman-sqli/</guid><description>OpenDocMan version 1.3.4 is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries via the 'where' parameter in search.php to extract sensitive information.</description><content:encoded><![CDATA[<p>OpenDocMan 1.3.4 is susceptible to SQL injection attacks due to insufficient input validation. An unauthenticated attacker can inject malicious SQL code into the &lsquo;where&rsquo; parameter of the <code>search.php</code> endpoint. This vulnerability allows attackers to bypass normal query restrictions, potentially leading to the extraction of sensitive data from the database. The vulnerability was published on 2026-04-05 and assigned CVE-2019-25684. Successful exploitation grants attackers unauthorized access to database contents without requiring authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an OpenDocMan 1.3.4 instance.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/search.php</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>where</code> parameter of the GET request.</li>
<li>The web server passes the crafted SQL query to the database without proper sanitization.</li>
<li>The database executes the injected SQL code, potentially returning sensitive data.</li>
<li>The attacker receives the database response containing the extracted information.</li>
<li>The attacker analyzes the extracted data for sensitive information such as usernames, passwords, or confidential documents.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to the complete compromise of the OpenDocMan database. An attacker can access sensitive information, including user credentials and confidential documents, potentially impacting all users of the affected OpenDocMan instance. There are no specific details about victim counts or targeted sectors available, but the impact could be widespread, depending on the deployment of OpenDocMan.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>where</code> parameter in <code>search.php</code> to prevent SQL injection.</li>
<li>Deploy the Sigma rule to detect attempts to exploit CVE-2019-25684 by monitoring for suspicious SQL syntax in the &lsquo;where&rsquo; parameter within web server logs.</li>
<li>Upgrade to a patched version of OpenDocMan that addresses this vulnerability when available.</li>
<li>Monitor web server logs for unusual activity targeting the <code>search.php</code> endpoint, as indicated in the attack chain.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>vulnerability</category><category>opendocman</category></item><item><title>Advance Gift Shop Pro Script 2.0.3 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-advance-giftshop-sqli/</link><pubDate>Sun, 05 Apr 2026 21:16:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-advance-giftshop-sqli/</guid><description>Advance Gift Shop Pro Script 2.0.3 is vulnerable to SQL injection via the 's' search parameter, allowing unauthenticated attackers to execute arbitrary SQL queries and extract sensitive database information.</description><content:encoded><![CDATA[<p>Advance Gift Shop Pro Script 2.0.3 is susceptible to SQL injection attacks due to insufficient input sanitization on the &rsquo;s&rsquo; parameter, which is used in search requests. This vulnerability, identified as CVE-2019-25680, enables unauthenticated remote attackers to inject malicious SQL code directly into the search query, potentially leading to full database compromise. Successful exploitation allows attackers to bypass authentication, retrieve sensitive data (such as usernames, passwords, or customer data), modify database content, or even execute arbitrary commands on the underlying server. This vulnerability poses a significant risk to e-commerce platforms utilizing this software, as it could result in data breaches, financial losses, and reputational damage. Defenders should prioritize patching or mitigating this vulnerability immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies an Advance Gift Shop Pro Script 2.0.3 installation.</li>
<li>The attacker crafts a malicious SQL injection payload, designed to exploit the &rsquo;s&rsquo; parameter in a search query.</li>
<li>The attacker sends a specially crafted HTTP GET request to the target server, including the SQL injection payload in the &rsquo;s&rsquo; parameter (e.g., <code>/?s=';SELECT version();--</code>).</li>
<li>The web application fails to properly sanitize the input, passing the malicious payload directly to the SQL database.</li>
<li>The database executes the injected SQL query, returning the results to the attacker. This could include database version information or other sensitive data.</li>
<li>The attacker refines the SQL injection payload to extract more sensitive data, such as user credentials or financial information, using techniques like UNION-based injection or time-based blind injection.</li>
<li>The attacker uses the extracted credentials to gain administrative access to the application.</li>
<li>The attacker leverages administrative access to further compromise the system, potentially installing a web shell, exfiltrating sensitive data, or performing other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2019-25680) in Advance Gift Shop Pro Script 2.0.3 can have severe consequences. Attackers can potentially access and exfiltrate sensitive customer data, including personally identifiable information (PII), financial records, and login credentials. Modification or deletion of data can lead to business disruption and financial losses. In severe cases, attackers could gain complete control over the web server, leading to further compromise of the entire infrastructure. The impact depends on the sensitivity of the data stored in the database and the extent of the attacker&rsquo;s access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for Advance Gift Shop Pro Script 2.0.3 to address CVE-2019-25680.</li>
<li>Implement robust input validation and sanitization techniques to prevent SQL injection attacks. Focus on sanitizing the &rsquo;s&rsquo; parameter in search requests.</li>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempt via URI</code> to identify potential exploitation attempts in web server logs.</li>
<li>Consider using a web application firewall (WAF) to filter out malicious requests containing SQL injection payloads, based on the vulnerability (CVE-2019-25680).</li>
<li>Regularly monitor web server logs for suspicious activity, such as unusual database queries or error messages, as identified by the Sigma rule below.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>vulnerability</category><category>webapp</category></item><item><title>eDirectory SQL Injection Vulnerability (CVE-2019-25675)</title><link>https://feed.craftedsignal.io/briefs/2026-04-edirectory-sqli/</link><pubDate>Sun, 05 Apr 2026 21:16:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-edirectory-sqli/</guid><description>Unauthenticated attackers can exploit SQL injection vulnerabilities in eDirectory (CVE-2019-25675) to bypass administrator authentication and disclose sensitive files.</description><content:encoded><![CDATA[<p>CVE-2019-25675 describes multiple SQL injection vulnerabilities affecting eDirectory. An unauthenticated attacker can exploit these vulnerabilities to bypass administrator authentication and disclose sensitive files. The vulnerability lies in the <code>key</code> parameter of the login endpoint. By injecting SQL code, specifically a UNION-based SQL injection, an attacker can authenticate as an administrator. After successful authentication, the attacker can then exploit file disclosure vulnerabilities in the <code>language_file.php</code> script to read arbitrary PHP files from the server, potentially exposing sensitive configuration data or credentials. This vulnerability poses a significant risk as it allows unauthorized access and data exfiltration without requiring any prior authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP request to the login endpoint of eDirectory.</li>
<li>The attacker injects SQL code into the <code>key</code> parameter within the request, using a UNION-based SQL injection technique.</li>
<li>The eDirectory server improperly processes the SQL injection, allowing the attacker to bypass authentication and gain administrator privileges.</li>
<li>The attacker, now authenticated as an administrator, sends a request to the <code>language_file.php</code> script.</li>
<li>The attacker exploits a file disclosure vulnerability in the <code>language_file.php</code> script by manipulating input parameters.</li>
<li>The server, due to the vulnerability, reads the arbitrary PHP file specified by the attacker.</li>
<li>The server returns the contents of the requested PHP file to the attacker.</li>
<li>The attacker analyzes the disclosed PHP file, potentially revealing sensitive information such as database credentials or configuration details.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2019-25675 allows unauthenticated attackers to gain complete control over the affected eDirectory instance. This can lead to the exfiltration of sensitive data, including user credentials and configuration information. While the specific number of victims is not stated, the potential impact is high considering the widespread use of eDirectory in various sectors. A successful attack could compromise the confidentiality and integrity of critical systems and data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or updates for eDirectory to address the SQL injection vulnerabilities described in CVE-2019-25675.</li>
<li>Deploy the Sigma rule <code>Detect eDirectory language_file.php File Disclosure</code> to detect attempts to exploit the file disclosure vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect eDirectory SQL Injection Attempt</code> to detect SQL injection attempts against the login endpoint.</li>
<li>Monitor web server logs for suspicious requests to the login endpoint (<code>/login</code>) and <code>language_file.php</code> to identify potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>edirectory</category><category>cve-2019-25675</category></item><item><title>PilusCart 1.4.1 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-piluscart-sqli/</link><pubDate>Sun, 05 Apr 2026 21:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-piluscart-sqli/</guid><description>PilusCart 1.4.1 is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter to extract sensitive database information.</description><content:encoded><![CDATA[<p>PilusCart 1.4.1 is susceptible to a SQL injection vulnerability (CVE-2019-25672) that allows unauthenticated attackers to inject malicious SQL code via the &lsquo;send&rsquo; parameter. This vulnerability enables attackers to manipulate database queries, potentially leading to the extraction of sensitive information. The attack involves crafting malicious POST requests to the comment submission endpoint using RLIKE-based boolean SQL injection techniques. Successful exploitation grants attackers unauthorized access to the database, impacting confidentiality and potentially integrity. Defenders need to implement robust input validation and sanitization measures to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the comment submission endpoint in PilusCart 1.4.1.</li>
<li>The attacker crafts a malicious POST request targeting the comment submission endpoint.</li>
<li>The POST request includes a SQL injection payload within the &lsquo;send&rsquo; parameter.</li>
<li>The payload utilizes RLIKE-based boolean SQL injection to bypass input validation.</li>
<li>The application processes the malicious POST request without proper sanitization of the &lsquo;send&rsquo; parameter.</li>
<li>The injected SQL code is executed within the context of the database query.</li>
<li>The attacker extracts sensitive data from the database through boolean-based inference.</li>
<li>The attacker gains unauthorized access to sensitive information, such as user credentials or financial data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SQL injection vulnerability (CVE-2019-25672) in PilusCart 1.4.1 can lead to the unauthorized disclosure of sensitive data, potentially affecting all users and customers of the vulnerable application. While the number of victims is currently unknown, the impact could be significant depending on the sensitivity of the data stored in the database. This vulnerability can lead to data breaches, financial losses, and reputational damage for organizations using the affected PilusCart version.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect PilusCart SQL Injection Attempt via Send Parameter</code> to detect malicious POST requests targeting the comment submission endpoint (log source: webserver).</li>
<li>Implement input validation and sanitization on the &lsquo;send&rsquo; parameter to prevent SQL injection attacks (reference: CVE-2019-25672).</li>
<li>Upgrade to a patched version of PilusCart that addresses the SQL injection vulnerability (reference: CVE-2019-25672).</li>
<li>Monitor web server logs for suspicious POST requests with RLIKE-based SQL injection payloads in the &lsquo;send&rsquo; parameter (log source: webserver).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>vulnerability</category><category>web-application</category></item><item><title>News Website Script 2.0.5 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-news-website-sqli/</link><pubDate>Sun, 05 Apr 2026 21:16:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-news-website-sqli/</guid><description>News Website Script 2.0.5 contains an SQL injection vulnerability (CVE-2019-25668) allowing unauthenticated attackers to extract sensitive information by injecting SQL code through the news ID parameter in GET requests.</description><content:encoded><![CDATA[<p>News Website Script version 2.0.5 is susceptible to SQL injection, as identified by CVE-2019-25668. This vulnerability allows unauthenticated remote attackers to manipulate database queries by injecting malicious SQL code via the &rsquo;news ID&rsquo; parameter. Successful exploitation grants attackers the ability to extract sensitive information directly from the application database. The vulnerability lies within the index.php/show/news/ endpoint and can be exploited via simple HTTP GET requests, making it easily accessible. The risk to organizations using this vulnerable software is significant, potentially leading to data breaches and unauthorized access to confidential information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable instance of News Website Script 2.0.5.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the <code>/index.php/show/news/</code> endpoint.</li>
<li>The crafted GET request includes a <code>news</code> parameter containing a SQL injection payload.</li>
<li>The web server receives the malicious request and passes the SQL injection payload to the application&rsquo;s database query.</li>
<li>The database executes the injected SQL code without proper sanitization.</li>
<li>The attacker extracts sensitive data from the database, such as user credentials, financial information, or proprietary data.</li>
<li>The attacker may use the extracted information to further compromise the system or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2019-25668) can lead to the complete compromise of the affected News Website Script 2.0.5 database. The impact includes unauthorized access to sensitive data, potential data breaches, and the ability for attackers to modify or delete data. The number of potential victims is dependent on the install base of the vulnerable software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a secure version of News Website Script to remediate CVE-2019-25668.</li>
<li>Deploy the Sigma rule provided in this brief to detect exploitation attempts targeting the vulnerable endpoint <code>index.php/show/news/</code>.</li>
<li>Implement input validation and sanitization for all user-supplied input to prevent SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2019-25668</category><category>webserver</category></item><item><title>ResourceSpace 8.6 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-resourcespace-sqli/</link><pubDate>Sun, 05 Apr 2026 21:16:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-resourcespace-sqli/</guid><description>ResourceSpace 8.6 is vulnerable to SQL injection, allowing unauthenticated attackers to execute arbitrary SQL queries via the 'ref' parameter in GET requests to the watched_searches.php endpoint, leading to sensitive data extraction.</description><content:encoded><![CDATA[<p>ResourceSpace 8.6 is susceptible to a critical SQL injection vulnerability (CVE-2019-25662) that allows unauthenticated attackers to execute arbitrary SQL queries. The vulnerability is located within the watched_searches.php endpoint and is triggered through the &lsquo;ref&rsquo; parameter in GET requests. By injecting malicious SQL code into this parameter, attackers can bypass authentication and directly interact with the database, potentially extracting sensitive information such as usernames and credentials. This vulnerability poses a significant risk as it does not require any prior authentication, making exploitation straightforward for remote attackers. ResourceSpace is an open-source digital asset management (DAM) system. Successful exploitation of this vulnerability allows attackers to potentially compromise the entire system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a ResourceSpace 8.6 instance.</li>
<li>The attacker crafts a malicious SQL injection payload designed to extract data or manipulate the database. This payload is injected into the &lsquo;ref&rsquo; parameter.</li>
<li>The attacker sends a GET request to the <code>/watched_searches.php</code> endpoint with the crafted SQL payload within the <code>ref</code> parameter (e.g., <code>watched_searches.php?ref=SQL_injection_payload</code>).</li>
<li>The ResourceSpace application improperly processes the attacker-supplied SQL payload without proper sanitization.</li>
<li>The malicious SQL query is executed against the underlying database.</li>
<li>The database server processes the query and returns the results to the ResourceSpace application.</li>
<li>The ResourceSpace application displays the results, which may include sensitive information like usernames, passwords, or other confidential data.</li>
<li>The attacker retrieves the extracted sensitive data from the application&rsquo;s response.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the SQL injection vulnerability in ResourceSpace 8.6 can lead to the complete compromise of the affected system. Attackers can gain unauthorized access to sensitive data, including user credentials, financial information, and proprietary data. This could lead to financial loss, reputational damage, and legal liabilities. Given the nature of digital asset management systems, the compromised data might include valuable intellectual property or personally identifiable information (PII), potentially impacting a large number of individuals.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a secure version of ResourceSpace to remediate CVE-2019-25662.</li>
<li>Deploy the Sigma rule <code>Detect ResourceSpace SQL Injection Attempt</code> to monitor for exploitation attempts against the <code>/watched_searches.php</code> endpoint.</li>
<li>Implement input validation and sanitization on the &lsquo;ref&rsquo; parameter within the <code>watched_searches.php</code> endpoint to prevent SQL injection.</li>
<li>Enable web server logging and monitor for suspicious GET requests to <code>watched_searches.php</code> containing unusual characters or SQL keywords.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2019-25662</category><category>resourcespace</category></item><item><title>OpenProject SQL Injection Vulnerability (CVE-2026-34717)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openproject-sqli/</link><pubDate>Thu, 02 Apr 2026 18:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openproject-sqli/</guid><description>OpenProject versions before 17.2.3 are susceptible to SQL injection due to improper input sanitization in the '=n' operator, potentially allowing remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>OpenProject, a web-based project management software, is vulnerable to SQL injection in versions prior to 17.2.3. The vulnerability lies within the <code>=n</code> operator located in <code>modules/reporting/lib/report/operator.rb:177</code>. This operator improperly handles user input by directly embedding it into SQL WHERE clauses without adequate parameterization. An attacker could leverage this flaw to inject malicious SQL code, potentially leading to unauthorized data access, modification, or deletion. The vulnerability was reported on April 2, 2026, and patched in version 17.2.3. Organizations using vulnerable versions of OpenProject are at risk of data breaches and system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an OpenProject instance running a version prior to 17.2.3.</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that utilizes the vulnerable <code>=n</code> operator within the <code>modules/reporting/lib/report/operator.rb</code> file.</li>
<li>The malicious request injects SQL code through a parameter processed by the vulnerable operator.</li>
<li>The OpenProject application executes the attacker-controlled SQL code against the database due to the lack of input sanitization.</li>
<li>The attacker bypasses authentication or authorization checks by manipulating the SQL query.</li>
<li>The attacker retrieves sensitive data from the database, such as user credentials or project information.</li>
<li>The attacker may modify data within the database, potentially altering project configurations or injecting malicious content.</li>
<li>The attacker achieves complete database compromise, potentially leading to a full system takeover if database privileges are sufficient.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to significant data breaches, potentially exposing sensitive project data, user credentials, and confidential information. The impact ranges from unauthorized data access and modification to complete database compromise. Depending on the database privileges, this could lead to full system takeover. Organizations in various sectors utilizing vulnerable versions of OpenProject could be affected, resulting in financial losses, reputational damage, and legal liabilities. The CVSS v3.1 base score for this vulnerability is 9.9 (Critical).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenProject instances to version 17.2.3 or later to patch the SQL injection vulnerability (CVE-2026-34717).</li>
<li>Monitor web server logs for suspicious HTTP requests targeting the vulnerable endpoint (<code>modules/reporting/lib/report/operator.rb</code>) that contain SQL injection attempts. Deploy the provided Sigma rule <code>Detect OpenProject SQL Injection Attempt</code> to detect potential exploitation.</li>
<li>Implement a web application firewall (WAF) to filter out malicious requests and prevent SQL injection attacks.</li>
<li>Review and harden database access controls to minimize the impact of potential SQL injection attacks.</li>
<li>Enable and monitor audit logs for database activity to detect any unauthorized data access or modification.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>openproject</category><category>sqli</category><category>cve-2026-34717</category><category>web-application</category></item><item><title>OpenSTAManager Time-Based Blind SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-openstamanager-sqli/</link><pubDate>Thu, 02 Apr 2026 14:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openstamanager-sqli/</guid><description>OpenSTAManager versions before 2.10.2 are susceptible to time-based blind SQL injection via the 'options[stato]' GET parameter, allowing authenticated attackers to extract sensitive database information.</description><content:encoded><![CDATA[<p>OpenSTAManager, a management software for technical assistance and invoicing, contains a critical vulnerability that could lead to significant data breaches. Specifically, versions prior to 2.10.2 are vulnerable to Time-Based Blind SQL Injection (CVE-2026-28805) in its AJAX select handlers. The vulnerability exists due to the lack of sanitization, parameterization, or allowlist validation of the &lsquo;options[stato]&rsquo; GET parameter. This allows an authenticated attacker to inject arbitrary SQL queries, potentially compromising the entire database. Successful exploitation allows an attacker to extract sensitive data like usernames, password hashes, and financial records. Organizations using affected versions of OpenSTAManager should upgrade to version 2.10.2 immediately to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated attacker identifies the vulnerable AJAX select handler within the OpenSTAManager application.</li>
<li>The attacker crafts a malicious HTTP GET request targeting the vulnerable endpoint, injecting SQL code into the <code>options[stato]</code> parameter (e.g., <code>options[stato]=%' AND SLEEP(5) AND '%'='</code>).</li>
<li>The server-side application concatenates the attacker-supplied SQL code directly into a SQL WHERE clause without proper sanitization.</li>
<li>The injected SQL <code>SLEEP()</code> function causes a time delay on the server, confirming the successful injection to the attacker.</li>
<li>The attacker refines the SQL injection payload to extract specific data, such as the database version or user credentials, using conditional <code>SLEEP()</code> statements and character-by-character extraction techniques.</li>
<li>The attacker iterates through the database structure and tables, extracting sensitive data like usernames and password hashes.</li>
<li>Using the extracted credentials, the attacker gains unauthorized access to administrative functions within OpenSTAManager.</li>
<li>The attacker exfiltrates financial records and other sensitive data from the compromised database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the OpenSTAManager database. This includes the potential exposure of sensitive customer data, financial records, and internal user credentials. The impact could range from financial loss and reputational damage to legal repercussions for failing to protect sensitive information. Given the CVSS v3.1 base score of 8.8, this is a critical vulnerability requiring immediate attention.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenSTAManager to version 2.10.2 or later to patch CVE-2026-28805.</li>
<li>Deploy the Sigma rule &ldquo;Detect OpenSTAManager SQL Injection Attempt&rdquo; to monitor for malicious requests containing SQL injection payloads targeting the <code>options[stato]</code> parameter (see rules).</li>
<li>Implement web application firewall (WAF) rules to block requests containing SQL injection patterns, specifically targeting the <code>options[stato]</code> GET parameter.</li>
<li>Review web server logs for unusual activity and suspicious requests containing SQL syntax within the <code>options[stato]</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openstamanager</category><category>sqli</category><category>cve-2026-28805</category></item><item><title>code-projects Accounting System 1.0 SQL Injection Vulnerability (CVE-2026-5034)</title><link>https://feed.craftedsignal.io/briefs/2026-03-code-projects-sqli/</link><pubDate>Sun, 29 Mar 2026 06:16:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-code-projects-sqli/</guid><description>A remote SQL injection vulnerability exists in code-projects Accounting System 1.0 via manipulation of the 'cos_id' parameter in '/edit_costumer.php', potentially allowing unauthorized database access.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-5034, has been discovered in code-projects Accounting System version 1.0. The vulnerability resides in the <code>/edit_costumer.php</code> file within the Parameter Handler component. Attackers can remotely exploit this vulnerability by manipulating the <code>cos_id</code> argument. Publicly available exploit code exists, increasing the risk of widespread exploitation. This vulnerability allows unauthenticated remote attackers to potentially execute arbitrary SQL…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-5034</category><category>web-application</category></item><item><title>Group-Office JMAP Contact/Query SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-group-office-sqli/</link><pubDate>Fri, 27 Mar 2026 15:16:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-group-office-sqli/</guid><description>An authenticated SQL Injection vulnerability in Group-Office's JMAP Contact/query endpoint allows data extraction, including session tokens, leading to account takeover if unpatched.</description><content:encoded><![CDATA[<p>Group-Office, an enterprise CRM and groupware tool, contains a critical SQL injection vulnerability affecting versions prior to 6.8.158, 25.0.92, and 26.0.17. The vulnerability resides in the JMAP <code>Contact/query</code> endpoint. Any authenticated user with basic address book access can exploit this flaw to extract arbitrary data from the database. A successful exploit allows an attacker to retrieve sensitive information such as active session tokens belonging to other users. This can lead to complete account takeover, including the System Administrator account, without requiring the user&rsquo;s password. Applying the security patches released in versions 6.8.158, 25.0.92, and 26.0.17 resolves this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Group-Office application with a valid user account that has basic address book access privileges.</li>
<li>The attacker crafts a malicious JMAP <code>Contact/query</code> request containing a SQL injection payload within a parameter processed by the vulnerable endpoint.</li>
<li>The Group-Office application processes the crafted request without proper sanitization, allowing the SQL injection payload to be executed against the database.</li>
<li>The SQL injection attack is successful, allowing the attacker to extract sensitive information, including session tokens, user credentials, or other privileged data, from the database.</li>
<li>The attacker parses the database response and identifies valid session tokens belonging to other users.</li>
<li>The attacker uses the stolen session token to hijack another user&rsquo;s session, bypassing normal authentication procedures.</li>
<li>The attacker accesses the target user&rsquo;s account, gaining unauthorized access to sensitive data and functionalities.</li>
<li>Depending on the compromised user&rsquo;s privileges, the attacker can escalate privileges, access sensitive data, or perform administrative actions, leading to a complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to take over any account within the Group-Office system. The impact includes unauthorized access to sensitive customer data, financial records, and internal communications. System administrators are particularly at risk, as their compromise grants attackers full control over the Group-Office environment. This could lead to data breaches, service disruption, and reputational damage. The CVSS v3.1 base score is rated 8.8, highlighting the high severity of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Group-Office instances to version 6.8.158, 25.0.92, or 26.0.17 to patch CVE-2026-33755.</li>
<li>Inspect web server logs for suspicious POST requests to the <code>/jmap</code> endpoint containing potentially malicious SQL syntax, as indicated in the rule &ldquo;Group-Office Suspicious JMAP Contact Query&rdquo;.</li>
<li>Deploy the Sigma rule &ldquo;Group-Office Potential Session Token Theft&rdquo; to detect unauthorized access attempts using potentially stolen session tokens.</li>
<li>Implement robust input validation and sanitization measures to prevent SQL injection vulnerabilities in all web applications.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-33755</category><category>group-office</category><category>jmap</category></item><item><title>Critical Vulnerabilities in n8n Workflow Automation Tool</title><link>https://feed.craftedsignal.io/briefs/2026-03-n8n-vulns/</link><pubDate>Fri, 27 Mar 2026 09:40:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-n8n-vulns/</guid><description>Multiple critical vulnerabilities in n8n, including prototype pollution, code injection, and SQL injection, allow authenticated users to achieve remote code execution, read sensitive files, and perform unauthorized database operations.</description><content:encoded><![CDATA[<p>Multiple critical vulnerabilities have been discovered in n8n, an extendable, node-based workflow automation tool used for connecting SaaS applications and automating complex business logic. These vulnerabilities, identified as CVE-2026-33696, CVE-2026-33660, and CVE-2026-33713, can be exploited by authenticated users. Successful exploitation allows for remote code execution on the host system, reading sensitive local files, and performing unauthorized database operations. The vulnerabilities affect the XML, GSuiteAdmin, and Merge nodes, as well as the Data Table Get node. These flaws represent a critical threat to the confidentiality and integrity of n8n deployments. The Centre for Cybersecurity Belgium (CCB) strongly recommends immediate patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to an n8n instance.</li>
<li>For CVE-2026-33696, the attacker crafts a malicious request targeting the XML or GSuiteAdmin node to write values to Object.prototype.</li>
<li>For CVE-2026-33660, the attacker uses the Merge node with the &ldquo;Combine by SQL&rdquo; mode and exploits the AlaSQL sandbox escape to inject arbitrary code.</li>
<li>For CVE-2026-33713, the attacker crafts a malicious SQL query via the Data Table Get node.</li>
<li>The injected code or SQL commands are executed by the n8n server.</li>
<li>The attacker gains the ability to read sensitive files from the host system.</li>
<li>The attacker executes arbitrary commands on the host, leading to full remote code execution.</li>
<li>The attacker performs unauthorized operations in the database, potentially modifying or deleting data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows an attacker to gain full remote code execution on the n8n host system, potentially compromising the entire server infrastructure. The attacker can also read sensitive local files, potentially exposing credentials and configuration data. In PostgreSQL deployments, the attacker can modify and delete data due to multi-statement execution capabilities via SQL injection (CVE-2026-33713). This can lead to significant data loss and disruption of services relying on the n8n platform.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch n8n instances to the latest version to address CVE-2026-33696, CVE-2026-33660, and CVE-2026-33713 (reference: CCB advisory).</li>
<li>Implement the provided Sigma rules to detect potential exploitation attempts in your n8n environment.</li>
<li>Monitor n8n logs for suspicious SQL queries and code execution patterns, focusing on the Data Table Get and Merge nodes (reference: CVE-2026-33713 and CVE-2026-33660 descriptions).</li>
<li>Review n8n access controls and ensure the principle of least privilege to minimize the impact of potential exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>n8n</category><category>vulnerability</category><category>rce</category><category>sqli</category><category>code-injection</category></item><item><title>KomSeo Cart 1.3 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-komseo-sqli/</link><pubDate>Thu, 26 Mar 2026 12:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-komseo-sqli/</guid><description>KomSeo Cart 1.3 is vulnerable to SQL injection via the 'my_item_search' parameter in edit.php, allowing attackers to inject SQL commands and extract sensitive database information.</description><content:encoded><![CDATA[<p>KomSeo Cart version 1.3 is susceptible to SQL injection attacks through the &lsquo;my_item_search&rsquo; parameter found within the edit.php file. This vulnerability allows unauthenticated attackers to inject arbitrary SQL commands into the application&rsquo;s database queries. Successful exploitation of this flaw enables attackers to extract sensitive information from the database, potentially compromising user credentials, financial data, or other confidential information. The vulnerability can be exploited using boolean-based blind or error-based SQL injection techniques. This poses a significant risk to e-commerce platforms using the affected KomSeo Cart version, potentially leading to data breaches and financial losses.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a KomSeo Cart 1.3 instance.</li>
<li>The attacker crafts a malicious SQL payload specifically designed for the &lsquo;my_item_search&rsquo; parameter in the <code>edit.php</code> script.</li>
<li>The attacker sends a POST request to <code>edit.php</code> with the &lsquo;my_item_search&rsquo; parameter containing the SQL injection payload.</li>
<li>The KomSeo Cart application processes the request and incorporates the malicious SQL code into a database query.</li>
<li>The database executes the injected SQL code.</li>
<li>Depending on the type of SQL injection (boolean-based blind or error-based), the attacker analyzes the application&rsquo;s response to infer information about the database structure and data.</li>
<li>The attacker refines the SQL injection payload to extract specific sensitive information, such as usernames, passwords, or financial records.</li>
<li>The attacker exfiltrates the extracted data for malicious purposes, potentially leading to identity theft, financial fraud, or further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2018-25206) in KomSeo Cart 1.3 can lead to the complete compromise of the affected e-commerce platform&rsquo;s database. Attackers can steal sensitive customer data, including usernames, passwords, addresses, and financial details. This can result in significant financial losses for both the e-commerce business and its customers. The vulnerability affects all installations of KomSeo Cart 1.3 that have not been patched.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect KomSeo Cart SQL Injection Attempt&rdquo; to detect malicious POST requests to <code>edit.php</code> with suspicious SQL payloads in the &lsquo;my_item_search&rsquo; parameter.</li>
<li>Inspect web server logs for POST requests to <code>edit.php</code> containing SQL-related keywords or functions in the &lsquo;my_item_search&rsquo; parameter (log source: webserver).</li>
<li>Upgrade to a patched version of KomSeo Cart that addresses the SQL injection vulnerability, if available.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>vulnerability</category><category>web-application</category></item><item><title>Wecodex Hotel CMS 1.0 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-wecodex-sqli/</link><pubDate>Thu, 26 Mar 2026 12:16:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-wecodex-sqli/</guid><description>Wecodex Hotel CMS 1.0 is vulnerable to SQL injection in the admin login functionality, allowing unauthenticated attackers to bypass authentication and potentially extract sensitive database information or gain administrative access by injecting SQL code through the username parameter in POST requests to index.php with action=processlogin.</description><content:encoded><![CDATA[<p>Wecodex Hotel CMS 1.0 is susceptible to an SQL injection vulnerability (CVE-2018-25195) within its admin login feature. Discovered in 2026, this flaw enables unauthenticated attackers to inject malicious SQL code into the &lsquo;username&rsquo; parameter of a POST request sent to the &lsquo;index.php&rsquo; page with the &lsquo;action=processlogin&rsquo; parameter. Successful exploitation could lead to the bypass of authentication mechanisms, potentially granting unauthorized administrative privileges. The vulnerability poses a significant risk to organizations utilizing the vulnerable CMS, as attackers could gain full control over the web application and its underlying data, including user credentials and sensitive business information. This requires immediate attention and patching.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Wecodex Hotel CMS 1.0 instance.</li>
<li>The attacker crafts a malicious SQL payload designed to bypass authentication.</li>
<li>The attacker sends a POST request to <code>index.php</code> with the parameter <code>action=processlogin</code>.</li>
<li>The crafted SQL payload is injected into the <code>username</code> parameter of the POST request.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL to the database.</li>
<li>The injected SQL code manipulates the authentication query, likely using <code>OR</code> clauses and commenting out the rest of the original query.</li>
<li>The manipulated query returns a successful authentication result, bypassing the intended login process.</li>
<li>The attacker gains unauthorized access to the administrative panel of the Wecodex Hotel CMS.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability allows attackers to bypass authentication controls and gain administrative access to the Wecodex Hotel CMS 1.0. This can lead to full compromise of the system, including the theft of sensitive data such as customer information, financial records, and proprietary business data. Attackers can also modify the website, inject malicious code, or use the compromised server as a launching point for further attacks. Given the potential for complete system compromise, this vulnerability poses a critical risk to affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Block POST requests to <code>/index.php</code> containing suspicious SQL syntax in the <code>username</code> parameter using a web application firewall (WAF) or intrusion detection system (IDS), based on the provided attack chain.</li>
<li>Deploy the provided Sigma rule to detect exploitation attempts targeting the login functionality of Wecodex Hotel CMS.</li>
<li>Upgrade to a patched version of Wecodex Hotel CMS that addresses CVE-2018-25195 if available from the vendor.</li>
<li>Implement parameterized queries or prepared statements in the application code to prevent SQL injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>authentication-bypass</category></item><item><title>SQL Injection Vulnerability in Simple Laundry System 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-03-simple-laundry-sqli/</link><pubDate>Thu, 26 Mar 2026 08:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-simple-laundry-sqli/</guid><description>A remote SQL Injection vulnerability exists in code-projects Simple Laundry System 1.0 within the Parameter Handler component's /checkregisitem.php file, where manipulating the Long-arm-shirtVol argument can trigger the injection, with a publicly available exploit.</description><content:encoded><![CDATA[<p>A critical security flaw has been identified in code-projects Simple Laundry System version 1.0. This vulnerability, tracked as CVE-2026-4850, resides within the Parameter Handler component, specifically in the <code>/checkregisitem.php</code> file. The vulnerability allows for remote SQL injection through the manipulation of the <code>Long-arm-shirtVol</code> argument. Successful exploitation could lead to unauthorized database access, data breaches, or complete system compromise. The availability of a public exploit amplifies the risk, making immediate patching or mitigation crucial. The vulnerability poses a threat to any instance of Simple Laundry System 1.0 accessible over a network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of Simple Laundry System 1.0.</li>
<li>Attacker crafts a malicious HTTP request targeting <code>/checkregisitem.php</code>.</li>
<li>The crafted request includes a modified <code>Long-arm-shirtVol</code> parameter containing SQL injection payloads.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL code to the database.</li>
<li>The database executes the injected SQL code, granting the attacker unauthorized access.</li>
<li>Attacker retrieves sensitive data from the database (e.g., user credentials, financial records).</li>
<li>Attacker uses the compromised data for malicious purposes (e.g., identity theft, financial fraud).</li>
<li>Attacker could potentially escalate privileges within the database server to execute arbitrary commands on the host system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could have severe consequences. Attackers could gain unauthorized access to sensitive data stored within the Simple Laundry System&rsquo;s database, including user credentials, transaction histories, and potentially financial information. The number of potential victims is directly proportional to the number of organizations still running the vulnerable Simple Laundry System 1.0. A successful attack could result in data breaches, financial losses, and reputational damage for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for Simple Laundry System 1.0 to address CVE-2026-4850.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious checkregisitem.php SQL Injection Attempt</code> to identify potential exploitation attempts in web server logs.</li>
<li>Implement input validation and sanitization measures within the <code>/checkregisitem.php</code> file to prevent SQL injection.</li>
<li>Monitor web server logs for suspicious activity related to the <code>/checkregisitem.php</code> endpoint using the IOCs listed in this brief.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>vulnerability</category></item><item><title>SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-online-enrollment-sqli/</link><pubDate>Thu, 26 Mar 2026 05:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-online-enrollment-sqli/</guid><description>A remote SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component affecting the `/sms/grades/index.php` file, allowing unauthorized database access and has been publicly disclosed.</description><content:encoded><![CDATA[<p>A critical SQL injection vulnerability has been identified in itsourcecode Online Enrollment System version 1.0. The vulnerability resides within the Parameter Handler component, specifically affecting the <code>/sms/grades/index.php</code> file when handling the <code>deptid</code> argument. This flaw allows unauthenticated remote attackers to inject arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. Given the public disclosure of the exploit, the risk of exploitation is significantly elevated. Organizations using this software should apply immediate mitigation measures to prevent potential compromise. The affected software is an Online Enrollment System, likely used by educational institutions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an instance of itsourcecode Online Enrollment System 1.0 exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/sms/grades/index.php?view=edit&amp;id=1</code>.</li>
<li>The attacker injects a SQL payload into the <code>deptid</code> parameter within the URL.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL query to the database.</li>
<li>The database executes the injected SQL code, potentially allowing the attacker to bypass authentication and authorization checks.</li>
<li>The attacker retrieves sensitive data from the database, such as user credentials, student records, or financial information.</li>
<li>The attacker could modify database records, create new administrative accounts, or delete critical data.</li>
<li>The attacker gains complete control of the application and the underlying database server, leading to a full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to a full compromise of the Online Enrollment System. This can result in the theft of sensitive student and faculty data, including personally identifiable information (PII), academic records, and financial details. Attackers could also modify grades, alter enrollment data, or disrupt the system&rsquo;s availability, impacting thousands of students and administrative staff. The vulnerability has a CVSS v3.1 base score of 7.3, indicating a high level of severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect suspicious HTTP requests containing SQL injection attempts targeting the <code>/sms/grades/index.php</code> endpoint.</li>
<li>Implement input validation and sanitization measures within the itsourcecode Online Enrollment System to prevent SQL injection attacks.</li>
<li>Restrict access to the database server from the web application server to only necessary accounts and permissions.</li>
<li>Monitor web server logs for unusual activity and potential exploitation attempts related to CVE-2026-4842.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>vulnerability</category><category>web-application</category></item><item><title>SourceCodester Malawi Online Market SQL Injection Vulnerability (CVE-2026-4838)</title><link>https://feed.craftedsignal.io/briefs/2026-03-malawi-online-market-sqli/</link><pubDate>Thu, 26 Mar 2026 04:17:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-malawi-online-market-sqli/</guid><description>A remote SQL injection vulnerability (CVE-2026-4838) exists in the /display.php file of SourceCodester Malawi Online Market 1.0 due to improper input sanitization of the ID parameter, potentially allowing attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>The SourceCodester Malawi Online Market 1.0 is vulnerable to SQL injection (CVE-2026-4838). The vulnerability resides within the <code>/display.php</code> file, specifically in how the application handles the <code>ID</code> parameter. A remote attacker can manipulate this parameter to inject arbitrary SQL commands into the database query. This can potentially allow the attacker to read, modify, or delete sensitive data, or even gain control of the underlying database server. The vulnerability was published on…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>cve-2026-4838</category></item><item><title>OpenEMR Blind SQL Injection Vulnerability in Patient Search (CVE-2026-29187)</title><link>https://feed.craftedsignal.io/briefs/2026-03-openemr-sqli/</link><pubDate>Wed, 25 Mar 2026 23:17:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openemr-sqli/</guid><description>OpenEMR versions prior to 8.0.0.3 are susceptible to a blind SQL injection vulnerability in the Patient Search functionality, allowing authenticated attackers to execute arbitrary SQL commands by manipulating HTTP parameter keys.</description><content:encoded>&lt;p>OpenEMR, a widely used open-source electronic health records and medical practice management application, has a critical security flaw. Specifically, versions prior to 8.0.0.3 contain a blind SQL injection vulnerability affecting the Patient Search functionality located at &lt;code>/interface/new/new_search_popup.php&lt;/code>. Authenticated attackers can exploit this vulnerability, identified as CVE-2026-29187, by manipulating HTTP parameter keys during patient searches. Successful exploitation allows…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>openemr</category><category>vulnerability</category></item><item><title>Netartmedia Vlog System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-netartmedia-sqli/</link><pubDate>Tue, 24 Mar 2026 12:16:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-netartmedia-sqli/</guid><description>Netartmedia Vlog System is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the email parameter in the forgotten_password module.</description><content:encoded><![CDATA[<p>The Netartmedia Vlog System is susceptible to SQL injection (CVE-2019-25641). An unauthenticated attacker can exploit this vulnerability by injecting malicious SQL code through the email parameter in the forgotten_password module. The attacker sends crafted POST requests to index.php to manipulate database queries and extract sensitive information. This vulnerability exists due to improper neutralization of special elements used in an SQL command. This vulnerability was reported in March 2026. Successful exploitation allows attackers to potentially access sensitive data, modify database contents, or even gain unauthorized access to the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Netartmedia Vlog System instance.</li>
<li>The attacker crafts a malicious POST request targeting the <code>index.php</code> endpoint.</li>
<li>The POST request includes the <code>forgotten_password</code> module.</li>
<li>The attacker injects SQL code into the <code>email</code> parameter within the POST data.</li>
<li>The vulnerable application processes the crafted POST request without proper sanitization.</li>
<li>The injected SQL code is executed against the database.</li>
<li>Sensitive data, such as user credentials or configuration details, is extracted.</li>
<li>The attacker uses the extracted information for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2019-25641) can lead to unauthorized access to sensitive data within the Netartmedia Vlog System database. Attackers can potentially steal user credentials, modify system settings, or even gain complete control over the application. The number of affected installations is currently unknown, but any system running a vulnerable version of Netartmedia Vlog System is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for POST requests to <code>index.php</code> with the <code>forgotten_password</code> module and suspicious characters in the <code>email</code> parameter to detect potential exploitation attempts (webserver logs).</li>
<li>Apply appropriate input validation and sanitization techniques to the email parameter in the forgotten_password module of the Netartmedia Vlog System to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule provided below to detect attempts to exploit this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>vulnerability</category><category>web-application</category></item><item><title>WWBN AVideo SQL Injection Vulnerability (CVE-2026-33723)</title><link>https://feed.craftedsignal.io/briefs/2024-05-avideo-sqli/</link><pubDate>Mon, 23 Mar 2026 19:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-avideo-sqli/</guid><description>WWBN AVideo platform versions up to 26.0 are vulnerable to SQL injection (CVE-2026-33723), allowing authenticated attackers to inject arbitrary SQL commands via the 'user_id' POST parameter and extract sensitive data such as password hashes, API keys, and encryption salts.</description><content:encoded><![CDATA[<p>WWBN AVideo, an open-source video platform, is susceptible to a critical SQL injection vulnerability (CVE-2026-33723) affecting versions up to and including 26.0. The vulnerability resides within the <code>Subscribe::save()</code> method located in <code>objects/subscribe.php</code>. The application directly concatenates the <code>$this-&gt;users_id</code> property into an INSERT SQL query without proper sanitization or parameterized binding. This property originates from the <code>$_POST['user_id']</code> parameter in both…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>avideo</category><category>sqli</category><category>cve-2026-33723</category><category>web-application</category></item><item><title>WP Maps WordPress Plugin Time-Based SQL Injection Vulnerability (CVE-2026-2580)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wp-maps-sqli/</link><pubDate>Mon, 23 Mar 2026 00:16:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wp-maps-sqli/</guid><description>The WP Maps WordPress plugin before version 4.9.2 is vulnerable to time-based SQL Injection via the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive information from the database.</description><content:encoded><![CDATA[<p>The WP Maps – Store Locator, Google Maps, OpenStreetMap, Mapbox, Listing, Directory &amp; Filters plugin for WordPress, a widely used plugin for integrating map functionality into WordPress sites, contains a critical time-based SQL Injection vulnerability. Assigned CVE-2026-2580, this flaw affects all versions up to and including 4.9.1. The vulnerability lies within the &lsquo;orderby&rsquo; parameter, where insufficient input sanitization allows unauthenticated attackers to inject malicious SQL queries. By…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>sqli</category><category>cve-2026-2580</category><category>web-application</category></item><item><title>LiteLLM Proxy API Key Verification SQL Injection</title><link>https://feed.craftedsignal.io/briefs/2024-11-litellm-sqli/</link><pubDate>Fri, 08 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-litellm-sqli/</guid><description>A SQL injection vulnerability exists in LiteLLM versions 1.81.16 to prior to 1.83.7 allowing an unauthenticated attacker to inject SQL queries via a crafted 'Authorization' header, potentially leading to unauthorized data access or modification.</description><content:encoded><![CDATA[<p>A critical SQL injection vulnerability has been identified in LiteLLM, specifically affecting versions 1.81.16 through 1.83.6. The vulnerability resides within the proxy API key verification process. Due to improper sanitization of the <code>Authorization</code> header, an unauthenticated attacker can inject arbitrary SQL commands. This is achieved by sending a specially crafted header to any LLM API route, such as <code>POST /chat/completions</code>, which triggers the vulnerable query through the proxy&rsquo;s error-handling mechanism. Defenders should prioritize patching to version 1.83.7 or later to mitigate this risk, or implement the suggested workaround.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP <code>Authorization</code> header to a LiteLLM API endpoint (e.g., <code>/chat/completions</code>).</li>
<li>The LiteLLM proxy receives the request and extracts the API key from the <code>Authorization</code> header.</li>
<li>Due to insufficient sanitization, the API key value is directly concatenated into a SQL query string.</li>
<li>The vulnerable SQL query is executed against the proxy&rsquo;s database.</li>
<li>The attacker injects SQL code to read sensitive data, such as user credentials or API keys, from the database.</li>
<li>The attacker may further inject SQL code to modify data, potentially granting themselves administrative privileges or compromising other users&rsquo; accounts.</li>
<li>The attacker gains unauthorized access to the LiteLLM proxy.</li>
<li>The attacker leverages the compromised proxy to access and control connected LLMs, exfiltrate data, or disrupt services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to complete compromise of the LiteLLM proxy. Attackers could read or modify sensitive data within the proxy&rsquo;s database, including API keys and credentials. This could lead to unauthorized access to managed LLMs and potentially allow attackers to exfiltrate sensitive data, disrupt services, or gain a foothold for further attacks within the compromised environment. The impact is significant due to the potential for widespread data breaches and service disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade LiteLLM to version 1.83.7 or later to patch the SQL injection vulnerability as detailed in the advisory <a href="https://github.com/advisories/GHSA-r75f-5x8p-qvmc">GHSA-r75f-5x8p-qvmc</a>.</li>
<li>If upgrading is not immediately feasible, set <code>disable_error_logs: true</code> in the <code>general_settings</code> configuration to mitigate the risk as described in the advisory <a href="https://github.com/advisories/GHSA-r75f-5x8p-qvmc">GHSA-r75f-5x8p-qvmc</a>.</li>
<li>Monitor web server logs for suspicious <code>Authorization</code> headers containing SQL injection payloads to detect potential exploitation attempts. Deploy the provided Sigma rule targeting HTTP request patterns.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>litellm</category><category>web-application</category></item><item><title>SourceCodester Hotel Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-hotel-management-sqli/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-hotel-management-sqli/</guid><description>A SQL injection vulnerability exists in SourceCodester Hotel Management System 1.0 in the /index.php/reservation/check component due to improper sanitization of the room_type parameter, allowing a remote attacker to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>SourceCodester Hotel Management System version 1.0 is vulnerable to SQL injection. The vulnerability is located in the <code>/index.php/reservation/check</code> endpoint. Specifically, the <code>room_type</code> parameter is not properly sanitized, allowing for the injection of malicious SQL queries. This vulnerability can be exploited remotely and has been publicly disclosed, making it accessible to a wide range of threat actors. Successful exploitation allows attackers to read, modify, or delete sensitive data within the application&rsquo;s database. This could lead to unauthorized access, data breaches, and potential disruption of hotel operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of SourceCodester Hotel Management System 1.0.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/index.php/reservation/check</code> endpoint.</li>
<li>The malicious request includes a SQL injection payload within the <code>room_type</code> parameter.</li>
<li>The application processes the request without proper sanitization of the <code>room_type</code> parameter.</li>
<li>The injected SQL code is executed against the application&rsquo;s database.</li>
<li>The attacker extracts sensitive information from the database, such as user credentials, reservation details, or financial data.</li>
<li>The attacker may use the extracted credentials to gain unauthorized access to administrative panels.</li>
<li>The attacker may further compromise the system by modifying data, creating rogue accounts, or planting malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to significant data breaches, impacting both the hotel and its customers. Sensitive customer data, including personal information, reservation details, and payment information, could be exposed. The vulnerability could allow attackers to gain administrative access to the Hotel Management System, leading to further compromise of the system and potential disruption of hotel operations. Depending on the database configuration, the attacker may even be able to execute commands on the underlying operating system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect SQL injection attempts targeting the <code>/index.php/reservation/check</code> endpoint in web server logs.</li>
<li>Implement input validation and sanitization for all user-supplied input, especially the <code>room_type</code> parameter, to prevent SQL injection attacks.</li>
<li>Patch or upgrade to a secure version of SourceCodester Hotel Management System that addresses this SQL injection vulnerability. If a patch is unavailable, consider implementing a web application firewall (WAF) rule to filter out malicious requests.</li>
<li>Review and harden database security configurations to limit the privileges of the database user account used by the application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>vulnerability</category><category>web application</category></item><item><title>NocoBase SQL Injection via Recursive Eager Loading</title><link>https://feed.craftedsignal.io/briefs/2024-01-nocobase-sqli/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nocobase-sqli/</guid><description>NocoBase versions 2.0.32 and earlier are vulnerable to SQL injection due to string concatenation in the `queryParentSQL()` function, allowing attackers with record creation permissions to inject arbitrary SQL and potentially extract sensitive information or execute commands.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability exists in NocoBase version 2.0.32 and earlier due to string concatenation in the <code>queryParentSQL()</code> function within the <code>@nocobase/database</code> core package. The vulnerability stems from how the <code>queryParentSQL()</code> function constructs a recursive CTE query by concatenating <code>nodeIds</code> instead of using parameterized queries. An attacker with record creation permissions on a tree collection with string-type primary keys can inject arbitrary SQL via a malicious string primary key value in a created record. This injection is triggered when a subsequent request initiates recursive eager loading on that collection. This can lead to confidentiality breaches (extraction of database values including credentials), integrity issues (data manipulation via stacked queries), and availability problems (resource exhaustion). On PostgreSQL with superuser privileges, OS command execution is possible. The vulnerability affects all collections using a tree/adjacency-list structure with string primary keys. The same concatenation pattern also exists in <code>plugin-field-sort/src/server/sort-field.ts:124</code>. The vulnerability is tracked as CVE-2026-41640.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains access to the NocoBase application with privileges to create records in a collection.</li>
<li>The attacker identifies a &ldquo;tree&rdquo; collection that utilizes a string-type primary key.</li>
<li>The attacker crafts a malicious primary key string containing SQL injection payload, such as <code>root') UNION ALL SELECT CAST((SELECT email FROM users LIMIT 1) AS integer)::text, NULL::text WHERE ('1'='1</code>.</li>
<li>The attacker creates a new record in the target collection using the crafted malicious primary key.</li>
<li>A subsequent request is made that triggers recursive eager loading on the target collection, specifically when a <code>BelongsTo</code> association has <code>recursively: true</code> and instances exist, calling the vulnerable <code>queryParentSQL</code> function.</li>
<li>The <code>queryParentSQL</code> function concatenates the malicious primary key into the SQL query without proper sanitization or parameterization.</li>
<li>The injected SQL code is executed against the database, allowing the attacker to extract sensitive data via error messages or potentially perform other malicious actions.</li>
<li>The attacker retrieves the extracted data from the error messages or through other means, such as direct database access if integrity is compromised.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This SQL injection vulnerability can lead to severe consequences. Successful exploitation can result in the unauthorized disclosure of sensitive information, including database credentials and other user data. Attackers can potentially modify data or execute arbitrary commands on the database server, leading to data corruption or system compromise. In the case of PostgreSQL databases with superuser privileges, attackers might gain operating system-level access. The vulnerability affects all collections using tree/adjacency-list structure with string-type primary keys, increasing the attack surface. Confirmed extractions include version information, database names, emails, and password hashes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect NocoBase SQL Injection Attempt in Primary Key</code> to your SIEM to detect attempts to exploit this vulnerability via malicious primary key values.</li>
<li>Apply the suggested fix from the advisory by using parameterized queries in <code>packages/core/database/src/eager-loading/eager-loading-tree.ts</code> as referenced in the overview.</li>
<li>Apply the same fix to <code>plugin-field-sort/src/server/sort-field.ts:124</code> to address the identical concatenation pattern as described in the overview.</li>
<li>Validate primary key values at record creation time to reject or escape values containing SQL metacharacters (<code>'</code>, <code>&quot;</code>, <code>;</code>, <code>--</code>) in string-type primary key fields, as suggested in the advisory.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>sqli</category><category>nocobase</category><category>cve-2026-41640</category><category>injection</category></item></channel></rss>