| Título | phpok3w 1.0 SQL Injection |
|---|
| Descripción | The article display function on the phpok3w front-end contains an SQL injection vulnerability. The application directly concatenates user-supplied GET parameters into SQL queries without proper validation or sanitization. An unauthenticated attacker can inject malicious input to tamper with the SQL query structure, leading to unexpected database query execution. This vulnerability allows attackers to modify SQL logic and potentially execute UNION-based queries to access sensitive database information. |
|---|
| Fuente | ⚠️ https://gitee.com/9786/phpok3w/issues/IDD1IZ |
|---|
| Usuario | formanagain (UID 93347) |
|---|
| Sumisión | 2025-12-15 07:54 (hace 4 meses) |
|---|
| Moderación | 2025-12-27 11:21 (12 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 338520 [9786 phpok3w hasta 901d96a06809fb28b17f3a4362c59e70411c933c show.php ID inyección SQL] |
|---|
| Puntos | 20 |
|---|