Description
Zechat 1.5 contains a SQL injection vulnerability in the v parameter that allows unauthenticated attackers to extract database information using time-based blind techniques. Attackers can exploit the v parameter with sleep-based blind injection to confirm vulnerability and extract data.
Published: 2026-05-17
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Zechat 1.5 contains a classic SQL injection flaw in the v request parameter that can be exploited without authentication. By injecting time delay functions such as SLEEP, an attacker can confirm the vulnerability and then slowly retrieve database content, leading to confidential data exposure. This weakness is identified as CWE-89, a typical example of unsanitized user input being incorporated into SQL statements.

Affected Systems

The flaw affects Zechat version 1.5, distributed by Bylancer. Customers deploying this specific release are the only ones exposed; newer releases that do not expose the v parameter or have proper sanitization are not impacted.

Risk and Exploitability

The vulnerability scores a CVSS of 8.8, indicating high severity. EPSS information is not available, but the lack of a mitigation means the risk remains high. The flaw is not listed in CISA’s KEV catalog yet, but the lack of authentication requirements makes it readily exploitable by any network actor who can reach the vulnerable endpoint. Attackers would target the unprotected v parameter URL, inject time-consuming SQL statements, and observe the latency to confirm and extract data.

Generated by OpenCVE AI on May 17, 2026 at 13:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Zechat to a patched release that removes or sanitizes the v parameter handling. If a vendor fix is not yet released, contact Bylancer or the Zechat maintainers to obtain an official patch or guidance.
  • Deploy a web application firewall rule that detects and blocks time‑based SQL injection patterns on the v parameter, and optionally limits response time to avoid successful blind extraction.
  • Restrict unauthenticated access to the endpoint that processes the v parameter or require a valid session before accepting the parameter, thereby adding an authentication barrier to the attack path.

Generated by OpenCVE AI on May 17, 2026 at 13:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 17 May 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Bylancer
Bylancer zechat
Vendors & Products Bylancer
Bylancer zechat

Sun, 17 May 2026 12:30:00 +0000

Type Values Removed Values Added
Description Zechat 1.5 contains a SQL injection vulnerability in the v parameter that allows unauthenticated attackers to extract database information using time-based blind techniques. Attackers can exploit the v parameter with sleep-based blind injection to confirm vulnerability and extract data.
Title Zechat 1.5 SQL Injection via v parameter (time-based blind)
First Time appeared Zechat Project
Zechat Project zechat
Weaknesses CWE-89
CPEs cpe:2.3:a:zechat_project:zechat:1.5:*:*:*:*:*:*:*
Vendors & Products Zechat Project
Zechat Project zechat
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Bylancer Zechat
Zechat Project Zechat
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-17T12:11:42.681Z

Reserved: 2026-05-17T12:06:26.103Z

Link: CVE-2018-25339

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-17T13:16:45.710

Modified: 2026-05-17T13:16:45.710

Link: CVE-2018-25339

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T16:59:50Z

Weaknesses