Home

Description

Atom CMS 2.0 contains an unauthenticated SQL injection vulnerability that allows remote attackers to manipulate database queries through unvalidated parameters. Attackers can inject malicious SQL code in the 'id' parameter of the admin index page to execute time-based blind SQL injection attacks.

PUBLISHED Reserved 2025-12-20 | Published 2025-12-22 | Updated 2025-12-22 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

2.0
affected

Credits

Hubert Wojciechowski finder

References

www.exploit-db.com/exploits/51086 (ExploitDB-51086) exploit

github.com/thedigicraft/Atom.CMS (Atom CMS GitHub Repository) product

www.vulncheck.com/...ated-sql-injection-via-admin-index-page (VulnCheck Advisory: Atom CMS 2.0 Unauthenticated SQL Injection via Admin Index Page) third-party-advisory

cve.org (CVE-2023-53975)

nvd.nist.gov (CVE-2023-53975)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.