First published: Fri Mar 10 2023(Updated: )
A vulnerability has been found in lmxcms 1.41 and classified as critical. Affected by this vulnerability is the function update of the file AcquisiAction.class.php. The manipulation of the argument id with the input -1 and updatexml(0,concat(0x7e,user()),1)# leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222727.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Lmxcms | =1.41 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-1321 is critical.
The vulnerability in AcquisiAction.class.php affects lmxcms 1.41 by allowing SQL injection through the manipulation of the id argument.
The affected version of lmxcms in CVE-2023-1321 is 1.41.
The SQL injection vulnerability in AcquisiAction.class.php can be exploited by manipulating the id argument with the input -1 and updatexml(0,concat(0x7e,user()),1)#.
At the moment, there is no known fix for CVE-2023-1321. It is recommended to update to a patched version or apply other mitigation measures if available.