OOP CMS BLOG 1.0 contains SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through multiple parameters. Attackers can inject SQL commands via the search parameter in search.php, pageid parameter in page.php, and id parameter in posts.php to extract database information including table names, schema names, and database credentials.
History

Fri, 06 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Description OOP CMS BLOG 1.0 contains SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through multiple parameters. Attackers can inject SQL commands via the search parameter in search.php, pageid parameter in page.php, and id parameter in posts.php to extract database information including table names, schema names, and database credentials.
Title OOP CMS BLOG 1.0 SQL Injection via search parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-06T12:19:22.036Z

Reserved: 2026-03-06T12:07:08.787Z

Link: CVE-2018-25199

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-06T13:16:03.310

Modified: 2026-03-06T13:16:03.310

Link: CVE-2018-25199

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.