Home

Description

OOP CMS BLOG 1.0 contains SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through multiple parameters. Attackers can inject SQL commands via the search parameter in search.php, pageid parameter in page.php, and id parameter in posts.php to extract database information including table names, schema names, and database credentials.

PUBLISHED Reserved 2026-03-06 | Published 2026-03-06 | Updated 2026-03-06 | Assigner VulnCheck




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

1.0
affected

Credits

Ihsan Sencan finder

References

www.exploit-db.com/exploits/45799 (ExploitDB-45799) exploit

www.vulncheck.com/...blog-sql-injection-via-search-parameter (VulnCheck Advisory: OOP CMS BLOG 1.0 SQL Injection via search parameter) third-party-advisory

cve.org (CVE-2018-25199)

nvd.nist.gov (CVE-2018-25199)

Download JSON