Impact
202CMS v10 beta has a blind SQL injection flaw that permits unauthenticated attackers to send crafted POST requests to index.php (via the log_user parameter) and manipulate database queries. The vulnerability is a classic SQL Injection (CWE-89) that allows exploitation through time‑based blind techniques to exfiltrate sensitive information from the database, resulting in potential data theft and compromised confidentiality.
Affected Systems
The affected product is Sourceforge:202CMS version 10.0 beta, enumerated by the CPE cpe:2.3:a:konradpl99:202cms:10.0:beta:*:*:*:*:*:*. No other product variants are documented for this vulnerability.
Risk and Exploitability
The flaw carries a high CVSS score of 8.8, indicating severe impact if exploited. The EPSS score is below 1 %, suggesting a low overall likelihood of widespread exploitation, and it is not listed in the CISA KEV catalog. Attackers require no prior authentication and can interact directly with the publicly reachable index.php endpoint, making this a remote, unauthenticated exploitation scenario.
OpenCVE Enrichment