OOP CMS BLOG 1.0 contains SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through multiple parameters. Attackers can inject SQL commands via the search parameter in search.php, pageid parameter in page.php, and id parameter in posts.php to extract database information including table names, schema names, and database credentials.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OOP CMS BLOG 1.0 contains SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through multiple parameters. Attackers can inject SQL commands via the search parameter in search.php, pageid parameter in page.php, and id parameter in posts.php to extract database information including table names, schema names, and database credentials. | |
| Title | OOP CMS BLOG 1.0 SQL Injection via search parameter | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-06T12:19:22.036Z
Reserved: 2026-03-06T12:07:08.787Z
Link: CVE-2018-25199
No data.
Status : Received
Published: 2026-03-06T13:16:03.310
Modified: 2026-03-06T13:16:03.310
Link: CVE-2018-25199
No data.
OpenCVE Enrichment
No data.