Impact
The vulnerability is a classic SQL injection (CWE‑89) in the 'option' parameter of Jettweb PHP Hazir Haber Sitesi Script v1. Attackers can send crafted POST requests to uyelik.php, causing the application to execute arbitrary SQL statements. This allows the extraction of sensitive database information, leading to unauthorized data access.
Affected Systems
The vulnerability affects installations of Jettweb PHP Hazir Haber Sitesi Script v1. The official product identifier is cpe:2.3:a:jettweb:php_stock_news_site_script:1:*:*:*:*:*:*:*, and all V1 instances are considered vulnerable due to the lack of a more granular version requirement in the CNA output.
Risk and Exploitability
The vulnerability has a CVSS score of 8.8, indicating high severity. The EPSS score is below 1 %, indicating that exploitation is not widespread at present, and it is not listed in the CISA KEV catalog. The attack vector is remote, over HTTP POST to uyelik.php, requiring only normal web access permissions to initiate the injection.
OpenCVE Enrichment