Impact
eDirectory features multiple SQL injection flaws in its login interface that allow a remote attacker to inject SQL code into the key parameter provided during authentication. The injection is union‑based and provides a means to bypass administrator credentials, effectively granting administrative privileges to the attacker. Once authenticated, the attacker can exploit existing file disclosure weaknesses in language_file.php to read arbitrary PHP files from the server, potentially revealing sensitive information or configuration data.
Affected Systems
All publicly released versions of the eDirectory product by the eDirectory vendor are affected. No specific edition or patch level is limited; the vulnerability applies across the product line.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.8, indicating a high severity rating. No EPSS score is available, and the issue is not listed in the CISA KEV catalog. Attackers can leverage the flaw over the network by sending an unauthenticated HTTP request to the login endpoint, injecting the malicious payload, and bypassing authentication to obtain full administrative rights. With those rights, attackers can read any PHP file on the server, potentially compromising confidentiality, integrity, and enabling further exploitation.
OpenCVE Enrichment