Description
OpenBiz Cubi Lite 3.0.8 contains a SQL injection vulnerability in the login form that allows unauthenticated attackers to manipulate database queries through the username parameter. Attackers can submit POST requests to /bin/controller.php with malicious SQL code in the username field to extract sensitive database information or bypass authentication.
Published: 2026-03-26
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated SQL Injection leading to data exposure or authentication bypass
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in a login form that processes user input without proper sanitization. An unauthenticated attacker can submit a crafted POST request to the controller endpoint, inserting SQL commands in the username field. This flaw permits execution of arbitrary database queries, allowing the attacker to read, modify, or delete sensitive data, or to bypass authentication entirely. The weakness aligns with CWE‑89, leading to potential loss of confidentiality and integrity of the application database.

Affected Systems

This flaw affects Sourceforge's OpenBiz Cubi Lite product, specifically version 3.0.8. Only this version is known to be affected according to the available CNA data.

Risk and Exploitability

The vulnerability is rated high with a CVSS score of 8.8, indicating a severe impact when exploited. Although EPSS data is unavailable, the absence from the KEV catalog does not mitigate the threat, as the flaw allows unauthenticated data access over the network. Attackers can exploit the flaw remotely via the public web interface, requiring no credentials. Due to the straightforward nature of the injection and the lack of authentication, the barrier to exploitation is low.

Generated by OpenCVE AI on March 26, 2026 at 13:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an available patch or upgrade to a newer OpenBiz Cubi Lite release that resolves the injection flaw.
  • Restrict direct POST access to the controller endpoint by configuring a web‑application firewall or network firewall to allow traffic only from trusted IP ranges.
  • Deploy a web‑application firewall rule that blocks suspicious SQL syntax in the username field.
  • Continuously monitor authentication and database logs for anomalous activity.
  • Verify with the SourceForge project page or vendor documentation that the affected version has been fixed before restoring normal access.

Generated by OpenCVE AI on March 26, 2026 at 13:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Sourceforge
Sourceforge openbiz Cubi Lite
Vendors & Products Sourceforge
Sourceforge openbiz Cubi Lite

Thu, 26 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description OpenBiz Cubi Lite 3.0.8 contains a SQL injection vulnerability in the login form that allows unauthenticated attackers to manipulate database queries through the username parameter. Attackers can submit POST requests to /bin/controller.php with malicious SQL code in the username field to extract sensitive database information or bypass authentication.
Title OpenBiz Cubi Lite 3.0.8 SQL Injection via username Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Sourceforge Openbiz Cubi Lite
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-26T18:25:23.772Z

Reserved: 2026-03-26T11:34:46.382Z

Link: CVE-2018-25209

cve-icon Vulnrichment

Updated: 2026-03-26T18:19:07.145Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-26T12:16:06.257

Modified: 2026-03-26T15:13:15.790

Link: CVE-2018-25209

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T08:36:01Z

Weaknesses