Submit #766141: https://github.com/TeamEasy/EasyCMS EasyCMS v1.6 SQL injection vulnerabilityinfo

Titelhttps://github.com/TeamEasy/EasyCMS EasyCMS v1.6 SQL injection vulnerability
BeschreibungThere exists a SQL injection vulnerability in the /RbacuserAction.class.php file of EasyCMS v1.6. This vulnerability is triggered when a user clicks Refresh on the backend user management page, because the system fails to effectively filter and validate the request parameter _order, allowing attackers to craft malicious request packets with injection markers to exploit the flaw. Verified via sqlmap, this vulnerability is of the time-based blind injection type and is compatible with MySQL ≥ 5.0.12 databases. Once exploited, it enables attackers to bypass authentication, steal/tamper with/delete sensitive data in the database, and even execute system commands to take control of the server. This will lead to severe security incidents such as data leakage and server compromise, posing an enormous threat to system security and data confidentiality.
Quelle⚠️ https://github.com/ueh1013/VULN/issues/20
Benutzer
 0xheeo (UID 85569)
Einreichung24.02.2026 04:08 (vor 1 Monat)
Moderieren08.03.2026 08:03 (12 days later)
StatusAkzeptiert
VulDB Eintrag349753 [EasyCMS bis 1.6 Request Parameter RbacuserAction.class.php _order SQL Injection]
Punkte20

Do you need the next level of professionalism?

Upgrade your account now!