We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability classified as critical has been found in LmxCMS 1.41. Affected is the function manageZt of the file c\admin\ZtAction.class.php of the component POST Request Handler. The manipulation of the argument sortid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Es wurde eine kritische Schwachstelle in LmxCMS 1.41 entdeckt. Hiervon betroffen ist die Funktion manageZt der Datei c\admin\ZtAction.class.php der Komponente POST Request Handler. Dank der Manipulation des Arguments sortid mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
2025-05-10: | Advisory disclosed |
2025-05-10: | VulDB entry created |
2025-05-10: | VulDB entry last update |
xiaoyang (VulDB User)
vuldb.com/?id.308286 (VDB-308286 | LmxCMS POST Request ZtAction.class.php manageZt sql injection)
vuldb.com/?ctiid.308286 (VDB-308286 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.567191 (Submit #567191 | LmxCMS v1.41 SQL Injection)
github.com/...QL-Injection/blob/main/LmxCMS-SQL-Injection.md
Support options