Home

Description

SocialEngine versions 7.8.0 and prior contain a SQL injection vulnerability in the /activity/index/get-memberall endpoint where user-supplied input passed via the text parameter is not sanitized before being incorporated into a SQL query. An unauthenticated remote attacker can exploit this vulnerability to read arbitrary data from the database, reset administrator account passwords, and gain unauthorized access to the Packages Manager in the Admin Panel, potentially enabling remote code execution.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-23 | Updated 2026-04-23 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unknown

Any version
affected

Credits

Egidio Romano finder

References

karmainsecurity.com/KIS-2026-08 exploit

karmainsecurity.com/pocs/CVE-2026-41460.php exploit

karmainsecurity.com/KIS-2026-08 technical-description

socialengine.com product

www.vulncheck.com/...ection-via-activity-index-get-memberall third-party-advisory

cve.org (CVE-2026-41460)

nvd.nist.gov (CVE-2026-41460)

Download JSON