Home

Description

Quick.CMS 6.7 contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login authentication by manipulating the login form. Attackers can inject specific SQL payloads like ' or '1'='1 to gain unauthorized administrative access to the system.

PUBLISHED Reserved 2025-12-11 | Published 2025-12-11 | Updated 2025-12-18 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

6.7
affected

Credits

Diyar ./H4X.Forensics finder

References

www.exploit-db.com/exploits/51910 (ExploitDB-51910) exploit

www.opensolution.org (Official Product Homepage) product

opensolution.org/...ad/home.html?sFile=Quick.Cms_v6.7-en.zip (Software Link) product

www.vulncheck.com/...n-authentication-bypass-via-admin-login (VulnCheck Advisory: Quick.CMS 6.7 SQL Injection Authentication Bypass via Admin Login) third-party-advisory

cve.org (CVE-2024-58308)

nvd.nist.gov (CVE-2024-58308)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.