Home

Description

SQL injection (SQLi) in MegaCMS v12.0.0, specifically in the “id_territorio” parameter of the “/web_comunications/cms/get_provincias” endpoint. The vulnerability arises from inadequate validation and sanitisation of user input. Specifically, via a POST request, the “id_territorio” parameter, used immediately after the registration form is submitted, could be manipulated by an unauthenticated attacker to execute arbitrary SQL queries.

PUBLISHED Reserved 2026-02-27 | Published 2026-04-29 | Updated 2026-04-29 | Assigner INCIBE




CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:L

Problem types

CWE-89 Improper neutralization of special elements used in an SQL command ('SQL injection')

Product status

Default status
unaffected

12.0.0
affected

Credits

Miguel Ovejero (Lapsor) finder

References

www.incibe.es/...ection-megacms-crm-sistemas-de-fidelizacion patch

cve.org (CVE-2026-3325)

nvd.nist.gov (CVE-2026-3325)

Download JSON