Impact
Zeeways Jobsite CMS allows attackers to inject arbitrary SQL code through the 'id' parameter in several front‑end pages. By sending crafted GET requests that include SQL clauses such as GROUP BY and CASE statements, an attacker can manipulate database queries to read sensitive information from the backend. This vulnerability can expose confidential data, potentially compromising the entire application’s data integrity and confidentiality.
Affected Systems
All versions of the Zeeways Jobsite CMS are potentially vulnerable, as no specific version constraints are listed. The issue affects the pages news_details.php, jobs_details.php, and job_cmp_details.php across the CMS installation.
Risk and Exploitability
The CVSS score of 8.8 classifies this flaw as High severity. EPSS data is not available, and the vulnerability is not in the KEV catalog, suggesting no known large‑scale exploitation yet. The likely attack vector is via HTTP requests over the network, and because no authentication is required, any external user capable of directing requests to the affected URLs can exploit it.
OpenCVE Enrichment