Description
WebOfisi E-Ticaret 4.0 contains an SQL injection vulnerability in the 'urun' GET parameter of the endpoint that allows unauthenticated attackers to manipulate database queries. Attackers can inject SQL payloads through the 'urun' parameter to execute boolean-based blind, error-based, time-based blind, and stacked query attacks against the backend database.
Published: 2026-03-26
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Database Compromise
Action: Apply Patch
AI Analysis

Impact

The vulnerability is an unauthenticated SQL injection in the 'urun' GET parameter of Web‑Ofisi E‑Ticaret 4.0. Attackers can inject malicious SQL, allowing boolean‑based blind, error‑based, time‑based blind, and stacked query attacks against the backend database. This can enable unauthorized data retrieval, modification, or deletion, potentially exposing sensitive information or compromising the integrity of the shop’s database.

Affected Systems

The affected product is Web‑Ofisi E‑Ticaret V4, a web‑based e‑commerce platform. No specific version range is listed beyond V4, so all instances of that edition are potentially vulnerable.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity. The exploit probability metric is missing, but the lack of a KEV listing suggests no publicly known exploitation yet. The flaw is reachable through the public web interface without authentication, implying a high likelihood of exploitation. Attackers can leverage this to extract sensitive data or alter the database, leading to significant information disclosure or integrity compromise.

Generated by OpenCVE AI on March 26, 2026 at 13:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Contact Web‑Ofisi for a patch or fix
  • Disable direct manipulation of the 'urun' parameter by enforcing strict input validation
  • Apply web application firewall rules to block suspicious SQL patterns
  • If no patch is available, temporarily harden the application by removing the vulnerable endpoint or restricting access

Generated by OpenCVE AI on March 26, 2026 at 13:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Web-ofisi
Web-ofisi ticaret
Vendors & Products Web-ofisi
Web-ofisi ticaret

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description WebOfisi E-Ticaret 4.0 contains an SQL injection vulnerability in the 'urun' GET parameter of the endpoint that allows unauthenticated attackers to manipulate database queries. Attackers can inject SQL payloads through the 'urun' parameter to execute boolean-based blind, error-based, time-based blind, and stacked query attacks against the backend database.
Title WebOfisi E-Ticaret 4.0 SQL Injection via urun Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Web-ofisi Ticaret
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-26T11:39:56.394Z

Reserved: 2026-03-26T11:34:53.935Z

Link: CVE-2018-25210

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-26T12:16:06.460

Modified: 2026-03-26T15:13:15.790

Link: CVE-2018-25210

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T08:36:00Z

Weaknesses