Impact
The vulnerability exists in Joomla! Component Ek Rishta 2.10 and allows unauthenticated attackers to inject malicious SQL through the cid parameter of the user_detail view. Successful exploitation lets an attacker modify or read database contents, potentially exposing sensitive user data or site configuration. The flaw maps to CWE-89, indicating unsanitized input in SQL statements.
Affected Systems
Joomla! Component Ek Rishta version 2.10, developed by Harmistechnology, is installed on affected Joomla! sites.
Risk and Exploitability
The CVSS score of 8.8 demonstrates a high severity. While EPSS data is not available, the lack of a KEV listing suggests no known active exploitation yet, however the high CVSS and easy authentication bypass mean attackers could exploit this in a targeted or opportunistic manner. The injection can be triggered through a simple GET request, making it trivially exploitable over the public internet.
OpenCVE Enrichment