CVE-2018-25300
XATABoost CMS 1.0.0 contains a union-based SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the id parameter. Attackers can send GET requests to news.php with malicious id values to extract sensitive database information.
Ver en NVDAnálisis
XATABoost CMS is a niche content management system with very limited adoption in the developer community. While the SQL injection vulnerability is serious and allows unauthenticated data extraction, the software is not widely deployed enough to warrant an alert for general community admins.
Severidad
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:NCWE-89EPSS
Descripción técnica
XATABoost CMS 1.0.0 contains a union-based SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the id parameter. Attackers can send GET requests to news.php with malicious id values to extract sensitive database information.