Impact
The vulnerability is a classic SQL injection (CWE‑89) that permits attackers to inject arbitrary SQL code through the GET parameter 'u_id' on /admin/users.php and the POST parameter 'agent[]' on /admin/mailer.php. It enables unauthenticated users to perform time‑based blind SQL injections to read sensitive data or use sleep payloads to disrupt service. The impact includes data confidentiality breach, integrity violation, and availability degradation for affected systems.
Affected Systems
Affected product is Next Click Ventures RealtyScript version 4.0.2 (cpe:2.3:a:nextclickventures:realtyscript:4.0.2:*:*:*:*:*:*:*). No other versions or products are listed as affected in the data provided.
Risk and Exploitability
The CVSS score of 8.8 classifies this as high severity. The EPSS score of less than 1% suggests low current exploitation probability, but the vulnerability is not mitigated in the CISA KEV catalog. Attackers need only send crafted HTTP requests to the vulnerable endpoints; no authentication is required. If exploited, an attacker can exfiltrate data or cause denial of service via time‑based techniques.
OpenCVE Enrichment