Impact
The vulnerability is an SQL injection in the log_user parameter that allows attackers to insert arbitrary SQL into database queries. This can lead to unauthorized extraction of sensitive data or alteration of database contents. The weakness is identified as CWE-89, a classic input validation flaw.
Affected Systems
The affected system is Sourceforge:202CMS v10 beta (cpe:2.3:a:konradpl99:202cms:10.0:beta:*:*:*:*:*:*). No further versions are specified beyond the beta release; therefore any instance running 202CMS 10.0 beta is vulnerable.
Risk and Exploitability
The CVSS v3 score of 8.8 marks this as High severity. The EPSS score is below 1%, indicating low likelihood of exploitation, and it is not listed in KEV, so zero-day exploitation cases are currently unknown. Because the parameter is publicly exposed and authentication is not required, the attack vector is inferred to be remote and unauthenticated. Exploitation would involve sending a crafted request to the vulnerable endpoint, injecting SQL that the application fails to sanitize.
OpenCVE Enrichment