CVE-2018-25300
XATABoost CMS 1.0.0 contains a union-based SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the id parameter. Attackers can send GET requests to news.php with malicious id values to extract sensitive database information.
View on NVDAnalysis
XATABoost CMS is a niche content management system with very limited adoption in the developer community. While the SQL injection vulnerability is serious and allows unauthenticated data extraction, the software is not widely deployed enough to warrant an alert for general community admins.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:NCWE-89EPSS
Technical description
XATABoost CMS 1.0.0 contains a union-based SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the id parameter. Attackers can send GET requests to news.php with malicious id values to extract sensitive database information.