Submeter #725820: BiggiDroid Simple-PHP-Blog 1.0 SQL Injectioninformação

TítuloBiggiDroid Simple-PHP-Blog 1.0 SQL Injection
DescriçãoIn BiggiDroid Simple PHP CMS, admin/login.php concatenates the username and password directly into the SQL query without any sanitization. An attacker can type: xxx' OR '1'='1'-- in the password field, turning the entire WHERE clause into a always-true condition. This lets them log in to the admin panel without the correct password, achieving a “universal user” takeover.
Fonte⚠️ https://gitee.com/devilrunsun/mywork/issues/IDGMME
Utilizador
 devil_run_sun (UID 93950)
Submissão29/12/2025 14h05 (há 3 meses)
Moderação29/12/2025 16h14 (2 hours later)
EstadoAceite
Entrada VulDB338657 [BiggiDroid Simple PHP CMS 1.0 Admin Login /admin/login.php Nome de utilizador Injeção SQL]
Pontos20

Do you want to use VulDB in your project?

Use the official API to access entries easily!