First published: Sun Dec 31 2023(Updated: )
A vulnerability, which was classified as critical, was found in S-CMS up to 2.0_build20220529-20231006. This affects an unknown part of the file member/reg.php. The manipulation of the argument M_login/M_email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249393 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Simasy CMS | =1.0 | |
Simasy CMS | =1.5 | |
Simasy CMS | =2.0-build_20220529-20231006 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7191 is classified as a critical vulnerability.
To fix CVE-2023-7191, upgrade S-CMS to a patched version that addresses the SQL injection issue.
CVE-2023-7191 affects S-CMS versions up to 2.0_build20220529-20231006, including versions 1.0 and 1.5.
CVE-2023-7191 is an SQL injection vulnerability found in the member/reg.php file.
Yes, the exploit for CVE-2023-7191 has been disclosed to the public.