Soumettre #789501: dameng100 MuuCmf T6 cms 1.9.5.20260309 SQL Injectioninformation

Titredameng100 MuuCmf T6 cms 1.9.5.20260309 SQL Injection
DescriptionLink project: https://gitee.com/dameng100/muucmf/tree/1.9.1.20260103_release CVSS score: 9.8 (Critical) CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Description: SQL Injection (SQLi) in MuuCmf v1.9.5.20260309 allows an unauthenticated attacker to inject malicious SQL commands via the keyword parameter at the /index/Search/index.html endpoint. This vulnerability enables the extraction of sensitive database information and, depending on server configuration (e.g., secure_file_priv), can be escalated to Remote Code Execution (RCE) by writing a web shell to the server's file system.
La source⚠️ https://thinhneee.github.io/posts/muucmf-sqli/
Utilisateur
 thinhnee (UID 96296)
Soumission26/03/2026 03:02 (il y a 26 jours)
Modérer18/04/2026 18:00 (24 days later)
StatutAccepté
Entrée VulDB358199 [dameng100 muucmf 1.9.5.20260309 /index/Search/index.html getListByPage keyword injection SQL]
Points20

Want to know what is going to be exploited?

We predict KEV entries!