ServerZilla 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the email parameter. Attackers can send POST requests to reset.php with malicious email values containing SQL operators to bypass authentication and extract sensitive database information.
History

Fri, 06 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Description ServerZilla 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the email parameter. Attackers can send POST requests to reset.php with malicious email values containing SQL operators to bypass authentication and extract sensitive database information.
Title ServerZilla 1.0 SQL Injection via email Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-06T12:19:19.690Z

Reserved: 2026-03-06T12:01:23.687Z

Link: CVE-2018-25196

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-06T13:16:02.723

Modified: 2026-03-06T13:16:02.723

Link: CVE-2018-25196

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.