Impact
Placeto CMS Alpha rv.4 contains an SQL injection flaw that allows authenticated users to manipulate database queries by injecting SQL code through the 'page' parameter on the admin/edit.php endpoint. The vulnerability can be exploited via boolean‑based blind, time‑based blind, or UNION‑based techniques to extract sensitive database information. With a CVSS score of 7.1, the impact is classified as significant data exposure and potential unauthorized data manipulation.
Affected Systems
The affected vendor is Sourceforge:Placeto CMS, specifically the Placeto CMS Alpha rv.4 release. No additional patch versions are provided in the data, but the vulnerability applies to all installations of this version running the admin/edit.php endpoint.
Risk and Exploitability
The attack vector is web‑based and requires the attacker to be authenticated to the administrative interface. Exploitation conditions include sending crafted GET requests with malicious 'page' values, which can reveal database contents through inferred query results. The EPSS score is less than 1% and the vulnerability is not listed in the KEV catalog, indicating a low current exploitation probability, yet the moderate severity CVSS score warrants timely remediation.
OpenCVE Enrichment