Submeter #716078: EyouCMS 1.7.6 Command Injectioninformação

TítuloEyouCMS 1.7.6 Command Injection
DescriçãoEyouCMS version 1.7.6 contains a SQL Injection vulnerability in the backend template management functionality that leads to Remote Code Execution. The file manager implements incomplete input validation that only blocks {eyou:php} template tags while allowing {eyou:sql} tags. The {eyou:sql} tag handler executes arbitrary SQL queries with minimal restrictions (only blocking DELETE and TRUNCATE). By using MySQL INTO OUTFILE, an authenticated administrator can write malicious PHP files to the webroot, achieving remote code execution.
Fonte⚠️ https://note-hxlab.wetolink.com/share/XfINjg5i25Ud
Utilizador
 yu22x (UID 34832)
Submissão16/12/2025 02h20 (há 4 meses)
Moderação27/12/2025 12h24 (11 days later)
EstadoAceite
Entrada VulDB338521 [EyouCMS até 1.7.6 Backend Template Management FilemanagerLogic.php content Injeção SQL]
Pontos20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!