Impact
The bug is a classic SQL injection flaw in the GeneratePDF.php handler of phpTransformer 2016.9. A malicious attacker can send a crafted GET request with a payload inserted into the idnews parameter, causing the application to execute the supplied SQL statement against the underlying database. The consequence is that an attacker can read sensitive tables, dump passwords, or modify data, leading to data exfiltration and integrity compromise.
Affected Systems
The vulnerable software is phpTransformer version 2016.9 from the vendor Phptransformer. Only this specific release is affected; newer releases are not listed as vulnerable.
Risk and Exploitability
The CVSS base score is 8.8, indicating a high severity, while the EPSS score is currently below 1%, suggesting a low probability that the vulnerability will be actively exploited today. It is not in the CISA KEV catalog. The most likely attack vector is remote over the network, via ordinary HTTP GET requests to the GeneratePDF.php endpoint, as no authentication or other pre‑conditions are explicitly required in the description.
OpenCVE Enrichment