CVE-2021-26599: SQL Injection in ImpressCMS
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.92345%
CWE
Published
3/29/2022
Updated
1/27/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
impresscms/impresscms | composer | < 1.4.3 | 1.4.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper handling of the 'groups' parameter in findusers.php
. Both getUserCountByGroupLink
and getUsersByGroupLink
methods in the member handler class directly incorporate unsanitized user input into SQL queries. Multiple independent reports (Karmainsecurity, HackerOne) confirm these methods construct queries using $_POST['groups']
without parameterization or escaping. The patch in v1.4.3 specifically mentions 'improvements in findusers
logic and filtering', aligning with these functions being the attack vector.