Vulnerability Description
OOP CMS BLOG 1.0 contains SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through multiple parameters. Attackers can inject SQL commands via the search parameter in search.php, pageid parameter in page.php, and id parameter in posts.php to extract database information including table names, schema names, and database credentials.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tomalofficial | Php Oop Cms Blog | 1.0 |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/45799ExploitThird Party AdvisoryVDB Entry
- https://www.vulncheck.com/advisories/oop-cms-blog-sql-injection-via-search-paramThird Party Advisory
FAQ
What is CVE-2018-25199?
CVE-2018-25199 is a vulnerability with a CVSS score of 8.2 (HIGH). OOP CMS BLOG 1.0 contains SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through multiple parameters. Attackers can inj...
How severe is CVE-2018-25199?
CVE-2018-25199 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-25199?
Check the references section above for vendor advisories and patch information. Affected products include: Tomalofficial Php Oop Cms Blog.