Home

Description

A SQL injection vulnerability exists in the login functionality of Fikir Odalari AdminPando 1.0.1 before 2026-01-26. The username and password parameters are vulnerable to SQL injection, allowing unauthenticated attackers to bypass authentication completely. Successful exploitation grants full administrative access to the application, including the ability to manipulate the public-facing website content (HTML/DOM manipulation).

PUBLISHED Reserved 2025-09-23 | Published 2026-02-03 | Updated 2026-02-04 | Assigner mitre




CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unknown

1.0.1 (custom)
affected

References

onurcangenc.com.tr/...n-bypass-in-fikir-odaları-adminpando/ exploit

onurcangenc.com.tr/...n-bypass-in-fikir-odaları-adminpando/

github.com/onurcangnc/CVE-2025-10878-AdminPandov1.0.1-SQLi

cve.org (CVE-2025-10878)

nvd.nist.gov (CVE-2025-10878)

Download JSON