OOP CMS BLOG 1.0 contains SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through multiple parameters. Attackers can inject SQL commands via the search parameter in search.php, pageid parameter in page.php, and id parameter in posts.php to extract database information including table names, schema names, and database credentials.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/45799 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/oop-cms-blog-sql-injection-via-search-parameter | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-06 13:16
Updated : 2026-03-11 00:37
NVD link : CVE-2018-25199
Mitre link : CVE-2018-25199
CVE.ORG link : CVE-2018-25199
JSON object : View
Products Affected
tomalofficial
- php_oop_cms_blog
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
