Impact
The vulnerability is an unvalidated SQL injection that appears in the portalLogin.php endpoint of Inout Article Base CMS. Attackers can supply 'p' and 'u' parameters via a GET request, using XOR-based payloads, to influence SQL queries and retrieve sensitive data or trigger time‑based delays. The primary impact is that an unauthenticated user could read confidential database content or cause a denial of service, while the weakness is classed as CWE‑89.
Affected Systems
The affected product is Inout Article Base CMS from Inoutscripts. Specific version information is not disclosed in the data, so the risk applies to all publicly available builds of this CMS until a patch is issued.
Risk and Exploitability
With a CVSS score of 8.8 the vulnerability is considered high severity. No EPSS score is available, and it is not presently listed in the CISA KEV catalog. The attack can be carried out over the network by sending crafted GET requests to portalLogin.php; because the vector does not require authentication, any client with network access can exploit it.
OpenCVE Enrichment