| Title | Guangzhou Duoduo Information Technology Co., Ltd. likeadmin_php <= 1.9.6 SQL Injection |
|---|
| Description | A SQL injection vulnerability exists in the /adminapi/tools.generator/dataTable endpoint of likeadmin_php. The backend directly concatenates user-supplied input parameters (such as name and comment) into SQL queries without proper sanitization or parameterization. An authenticated attacker with administrative privileges can exploit this vulnerability to execute arbitrary SQL statements, leading to sensitive data disclosure, data manipulation, and potentially remote code execution (RCE) under certain conditions. |
|---|
| Source | ⚠️ https://github.com/likeadmin-likeshop/likeadmin_php/issues/8 |
|---|
| User | z0ng (UID 96775) |
|---|
| Submission | 04/08/2026 10:48 (19 days ago) |
|---|
| Moderation | 04/26/2026 10:03 (18 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 359658 [likeadmin-likeshop likeadmin_php up to 1.9.6 dataTable Admin API DataTableLists.php queryResult sql injection] |
|---|
| Points | 20 |
|---|