CVE-2020-26624: Gila CMS SQL Injection vulnerability
3.8
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| gilacms/gila | composer | <= 1.15.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided information indicates a SQL injection vulnerability in the ID parameter after authentication, but no specific code snippets, file paths, or function names are disclosed in the available resources. The GitHub repository's security policy and advisory do not contain technical details about the vulnerable implementation. While the vulnerability pattern suggests improper input sanitization in SQL query construction involving the ID parameter, the lack of commit diffs, patch details, or concrete code examples prevents confident identification of specific vulnerable functions. The PHP-based CMS likely contains vulnerable SQL query building logic in authentication-related controllers/models, but insufficient technical evidence exists to pinpoint exact functions with high confidence.