| Title | BiggiDroid Simple-PHP-Blog 1.0 SQL Injection |
|---|
| Description | In BiggiDroid Simple PHP CMS, admin/login.php concatenates the username and password directly into the SQL query without any sanitization.
An attacker can type:
xxx' OR '1'='1'--
in the password field, turning the entire WHERE clause into a always-true condition. This lets them log in to the admin panel without the correct password, achieving a “universal user” takeover. |
|---|
| Source | ⚠️ https://gitee.com/devilrunsun/mywork/issues/IDGMME |
|---|
| User | devil_run_sun (UID 93950) |
|---|
| Submission | 12/29/2025 14:05 (3 months ago) |
|---|
| Moderation | 12/29/2025 16:14 (2 hours later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 338657 [BiggiDroid Simple PHP CMS 1.0 Admin Login /admin/login.php Username sql injection] |
|---|
| Points | 20 |
|---|