| 标题 | 1000 Projects portfolio-management-system v1.0 SQL Injection |
|---|
| 描述 | A critical SQL injection vulnerability exists in 1000project `admin/block_status.php` and `admin/unblock_me.php`. The vulnerability allows an attacker to inject malicious SQL code through base64-encoded parameters, enabling unauthorized modification of user account status.
**Key Characteristics:**
- **Attack Vector**: Base64 encoded parameter injection
- **Impact**: Unauthorized user account status modification
- **Authentication**: Requires admin session (but can be bypassed)
The vulnerability stems from directly concatenating base64-decoded user input into SQL statements without any parameterization or validation. |
|---|
| 来源 | ⚠️ https://github.com/9str0IL/CVE/issues/3 |
|---|
| 用户 | 9str0il (UID 97218) |
|---|
| 提交 | 2026-04-10 04時59分 (18 日前) |
|---|
| 管理 | 2026-04-26 21時47分 (17 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 359742 [1000 Projects Portfolio Management System MCA 直到 1.0 /admin/block_status.php q SQL注入] |
|---|
| 积分 | 20 |
|---|