CVE-2017-5346: GeniXCMS SQL injection vulnerability
7.2
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.7685%
CWE
Published
5/14/2022
Updated
4/25/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
genix/cms | composer | < 1.0.0 | 1.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper neutralization of the 'id' parameter in backend post operations. The GitHub patch shows multiple instances where $_GET['id'] was used directly in database operations without validation. Key evidence includes:
- The commit adds Typo::int($_GET['id']) sanitization in posts.control.php
- CWE-89 directly maps to SQL injection via user-controlled parameters
- The vulnerability description specifies authenticated admins can exploit via 'id' parameter
- Multiple functions (delete/publish/unpublish) showed unsafe $_GET['id'] usage in their pre-patch versions
- The patch consistently adds integer validation across these entry points