Impact
This vulnerability is a classic SQL injection that occurs through the 'id' parameter in addclick.php, allowing attackers to execute arbitrary SQL queries. By sending specially crafted GET requests, an unauthenticated attacker can retrieve sensitive data or disrupt service. The weakness aligns with CWE-89. The impact includes potential data exfiltration, unauthorized data modification, and service interruption.
Affected Systems
The flaw affects Meeplace Business Review Script, a product developed by Meeplace. No specific version range is listed in the CNA data, so any installation that includes the addclick.php endpoint may be susceptible.
Risk and Exploitability
The CVSS base score is 7.1, indicating a high severity. EPSS data is unavailable, and the vulnerability is not listed in the CISA KEV catalog, suggesting it may not have been widely exploited yet. Attackers can launch the exploitation remotely over HTTP by supplying payloads in the 'id' query string. The attack does not require authentication, making it easily actionable by public threat actors.
OpenCVE Enrichment