Home

Description

Successful exploitation of the SQL injection vulnerability could allow a remote authenticated attacker to execute arbitrary commands via a specific interface, potentially enabling the attacker to access, modify, or delete sensitive information within the database.

PUBLISHED Reserved 2026-04-23 | Published 2026-05-13 | Updated 2026-05-13 | Assigner CSA




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unknown

prior to version 3.4.17
affected

Default status
unknown

prior to version 2.2.0
affected

Default status
unknown

prior to version 2.2.0
affected

Default status
unknown

prior to version 2.2.0
affected

Default status
unknown

prior to version 2.2.0
affected

Default status
unknown

prior to version 9.2.3
affected

Default status
unknown

prior to version 3.4.17.1
affected

Default status
unknown

prior to version 3.4.17
affected

Credits

Hoa Ly Van Huu finder

References

www.csa.gov.sg/alerts-and-advisories/alerts/al-2026-050/

cve.org (CVE-2026-6888)

nvd.nist.gov (CVE-2026-6888)

Download JSON