Submit #760180: ACME Technology jizhiCMS <=2.5.6 SQL Injectioninfo

TitleACME Technology jizhiCMS <=2.5.6 SQL Injection
DescriptionThere are multiple spliced WHERE conditions in the Jizhicms backend, leading to SQL injection vulnerabilities (batch interfaces). The file frphp/lib/Model.php directly concatenates `WHERE` clauses in multiple places when `$conditions` is a string.This can be exploited by sending a crafted request to the login endpoint with malicious SQL code.There are multiple places where batch interfaces are called. Basically, as long as there is a batch function, there will be an SQL injection vulnerability.This vulnerability can cause hazards such as webpage file deletion and database leakage.
Source⚠️ https://gist.github.com/0psPwn/46468da7329f7c676c737b4b6b473ddc
User
 Lin0ps (UID 95491)
Submission02/18/2026 09:32 AM (2 months ago)
Moderation02/26/2026 07:24 PM (8 days later)
StatusAccepted
VulDB entry348018 [jizhiCMS up to 2.5.6 Batch Interface frphp/lib/Model.php findAll data sql injection]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!