Home

Description

Silurus Classifieds Script 2.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the ID parameter. Attackers can send GET requests to wcategory.php with crafted SQL payloads in the ID parameter to extract database table names and sensitive information from the database.

PUBLISHED Reserved 2026-03-06 | Published 2026-03-06 | Updated 2026-03-06 | Assigner VulnCheck




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

2.0
affected

Credits

Ihsan Sencan finder

References

www.exploit-db.com/exploits/45838 (ExploitDB-45838) exploit

www.vulncheck.com/...s-script-sql-injection-via-wcategoryphp (VulnCheck Advisory: Silurus Classifieds Script 2.0 SQL Injection via wcategory.php) third-party-advisory

cve.org (CVE-2018-25182)

nvd.nist.gov (CVE-2018-25182)

Download JSON