Home

Description

ProjeQtor versions 7.0 through 12.4.3 contain an unauthenticated SQL injection vulnerability in the login functionality where the login variable is directly concatenated into a SQL query without parameterization or sanitization. Attackers can inject arbitrary SQL expressions through the username field at the authentication endpoint to create privileged accounts, read sensitive data, and execute operating system commands if the database user has elevated permissions.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-27 | Updated 2026-04-27 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

7.0 (semver)
affected

12.4.4 (semver)
unaffected

Credits

Yassine Damiri finder

Noé Susset finder

References

damiri.fr/en/cves/CVE-2026-41462 technical-description exploit

gryfman.fr/cves/CVE-2026-41462 technical-description exploit

www.projeqtor.com product

www.vulncheck.com/...unauthenticated-sql-injection-via-login third-party-advisory

cve.org (CVE-2026-41462)

nvd.nist.gov (CVE-2026-41462)

Download JSON