Submit #790797: foxcms <=1.2.6 SQL Injectioninfo

Titlefoxcms <=1.2.6 SQL Injection
DescriptionThe backend provides the ability to execute commands, directly receiving SQL statements submitted by users and calling Db::query() / Db::execute() to execute them. The code only intercepts DROP through string inclusion checks, but does not restrict high-risk statements like UPDATE/INSERT/DELETE/ALTER/CREATE/TRUNCATE/RENAME, nor does it implement parameterization, syntax whitelisting, or read-only mode restrictions. ...
Source⚠️ https://github.com/WAz1nR9/CVE/blob/main/FoxCMS_SQL
User
 WAz1nR9 (UID 96839)
Submission03/27/2026 04:47 (25 days ago)
Moderation04/19/2026 07:13 (23 days later)
StatusDuplicate
VulDB entry307443 [FoxCMS 1.2.5 DataBackup.php executeCommand sql injection]
Points0

Do you need the next level of professionalism?

Upgrade your account now!