Description
SAT CFDI 3.3 contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the 'id' parameter in the signIn endpoint. Attackers can submit POST requests with boolean-based blind, stacked queries, or time-based blind SQL injection payloads to extract sensitive data or compromise the application.
Published: 2026-03-26
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability exists in the signIn endpoint of SAT CFDI 3.3, allowing an attacker to inject arbitrary SQL through the 'id' field of a POST request. By using boolean‑based blind, stacked, or time‑based payloads, an attacker can read or modify database contents, leading to potential data exposure, unauthorized access, or compromise of the application. The weakness is a classic SQL injection (CWE‑89) that threatens confidentiality, integrity, and availability.

Affected Systems

Products affected are SAT CFDI 3.3 from Wecodex. No additional vendor or version details are specified beyond the 3.3 release, making this the primary affected version.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity, and since the vulnerability is accessible through a web endpoint, the attack vector is remote. EPSS data is not available, but the lack of a CISA KEV listing does not negate the risk; the potential for exploitation remains significant. Attackers would need network access to the web server hosting SAT CFDI and could exploit the signIn endpoint without authentication, exercising the SQL injection directly. Given the high score, timely remediation is essential.

Generated by OpenCVE AI on March 26, 2026 at 13:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patch or update from Wecodex that addresses the SQL injection in the signIn endpoint.
  • Restrict access to the signIn endpoint using firewall rules or web‑application firewall to limit exposure to trusted networks.
  • Implement input validation and use parameterized queries for the 'id' field to prevent SQL injection.
  • Monitor application logs for suspicious POST activity to the signIn endpoint and investigate any anomalies.

Generated by OpenCVE AI on March 26, 2026 at 13:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Wecodex
Wecodex sat Cfdi
Vendors & Products Wecodex
Wecodex sat Cfdi

Thu, 26 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description SAT CFDI 3.3 contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the 'id' parameter in the signIn endpoint. Attackers can submit POST requests with boolean-based blind, stacked queries, or time-based blind SQL injection payloads to extract sensitive data or compromise the application.
Title SAT CFDI 3.3 SQL Injection via signIn endpoint
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Wecodex Sat Cfdi
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-26T18:44:03.302Z

Reserved: 2026-03-26T11:32:32.898Z

Link: CVE-2018-25202

cve-icon Vulnrichment

Updated: 2026-03-26T18:43:58.911Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-26T12:16:04.850

Modified: 2026-03-26T15:13:15.790

Link: CVE-2018-25202

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T08:36:08Z

Weaknesses