Submeter #659661: projectworlds Online Shopping System 1.0 SQL Injectioninformação

Títuloprojectworlds Online Shopping System 1.0 SQL Injection
DescriçãoDuring the security assessment of "Shopping Cart System", I detected a critical SQL injection vulnerability in the "success.php" file. This vulnerability is attributed to the insufficient validation of user input for the "id" parameter. This inadequacy enables attackers to inject malicious SQL queries. Consequently, attackers can access the database without proper authorization, modify or delete data, and obtain sensitive information. Immediate corrective actions are essential to safeguard system security and uphold data integrity.
Fonte⚠️ https://github.com/underatted/CVE/issues/7
Utilizador
 underatted (UID 90321)
Submissão21/09/2025 15h56 (há 7 meses)
Moderação26/09/2025 14h12 (5 days later)
EstadoDuplicado
Entrada VulDB283805 [Project Worlds Free Download Online Shopping System até 192.168.1.88 success.php ID Injeção SQL]
Pontos0

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!