| Title | ACME Technology jizhiCMS <=2.5.6 SQL Injection |
|---|
| Description | There are multiple spliced WHERE conditions in the Jizhicms backend, leading to SQL injection vulnerabilities (batch interfaces). The file frphp/lib/Model.php directly concatenates `WHERE` clauses in multiple places when `$conditions` is a string.This can be exploited by sending a crafted request to the login endpoint with malicious SQL code.There are multiple places where batch interfaces are called. Basically, as long as there is a batch function, there will be an SQL injection vulnerability.This vulnerability can cause hazards such as webpage file deletion and database leakage. |
|---|
| Source | ⚠️ https://gist.github.com/0psPwn/46468da7329f7c676c737b4b6b473ddc |
|---|
| User | Lin0ps (UID 95491) |
|---|
| Submission | 02/18/2026 09:32 AM (2 months ago) |
|---|
| Moderation | 02/26/2026 07:24 PM (8 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 348018 [jizhiCMS up to 2.5.6 Batch Interface frphp/lib/Model.php findAll data sql injection] |
|---|
| Points | 20 |
|---|