Impact
OpenDocMan 1.3.4 contains an SQL injection flaw that allows an attacker to inject arbitrary SQL through the 'where' request parameter. By sending crafted GET requests to search.php, an unauthenticated user can manipulate database queries and read sensitive information, potentially exposing confidential business data. The weakness is a classic input validation error (CWE‑89).
Affected Systems
The vulnerability affects OpenDocMan, specifically the 1.3.4 release. No other versions are reported as affected in the supplied information.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity, while the EPSS score below 1% shows a low probability of exploitation. The flaw is not listed in the CISA KEV catalog, suggesting no known widespread exploitation. The likely attack vector is a network exposure where an external attacker can craft an HTTP GET request to search.php and supply malicious payloads via the 'where' parameter.
OpenCVE Enrichment