icon

We found results for “

CVE-2024-31212

Date: April 4, 2024

InstantCMS is a free and open source content management system. A SQL injection vulnerability affects instantcms v2.16.2 in which an attacker with administrative privileges can cause the application to execute unauthorized SQL code. The vulnerability exists in index_chart_data action, which receives an input from user and passes it unsanitized to the core model "filterFunc" function that further embeds this data in an SQL statement. This allows attackers to inject unwanted SQL code into the statement. The "period" should be escaped before inserting it in the query. As of time of publication, a patched version is not available.

Language: PHP

Severity Score

Severity Score

Weakness Type (CWE)

Improper Input Validation

CWE-20

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CWE-89

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): HIGH
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): LOW

Do you need more information?

Contact Us