Description
A vulnerability was identified in EasyCMS up to 1.6. This vulnerability affects unknown code of the file /UserAction.class.php. Such manipulation of the argument _order leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-17
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection that can expose or alter database information
Action: Immediate Patch
AI Analysis

Impact

A flaw in EasyCMS allows attackers to inject arbitrary SQL through the _order argument in the UserAction.class.php file. This leads to unauthorized data extraction or modification via the underlying database. The weakness is classified as CWE-74 and CWE-89, indicating improper SQL command handling and injection vulnerability.

Affected Systems

All installations of EasyCMS up to version 1.6 are affected, regardless of deployment environment. The vulnerability resides in the UserAction.class.php file and can be triggered via HTTP requests that pass the _order parameter.

Risk and Exploitability

The CVSS score of 6.9 reflects a moderate to high impact. The EPSS score of less than 1% suggests low overall likelihood of widespread exploitation, yet the exploit has been publicly released and can be executed remotely without authentication. The vulnerability is not listed in the CISA KEV catalog, but its public availability means targeted attacks are plausible. Attackers would typically craft an HTTP request containing malicious SQL through the _order parameter to hijack or manipulate data.

Generated by OpenCVE AI on April 18, 2026 at 15:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade EasyCMS to the latest released version that addresses the SQL injection flaw or apply a vendor‑provided patch if available.
  • If an immediate update is not feasible, restrict external access to the /UserAction.class.php endpoint by using firewall rules or web application firewall (WAF) policies that limit inbound traffic to trusted IP ranges.
  • Configure the web application or WAF to reject or sanitize the _order parameter, filtering out SQL meta‑characters or enforcing strictly typed input to prevent injection attacks.

Generated by OpenCVE AI on April 18, 2026 at 15:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:easycms:easycms:*:*:*:*:*:*:*:*

Tue, 20 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Easycms
Easycms easycms
Vendors & Products Easycms
Easycms easycms

Sat, 17 Jan 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in EasyCMS up to 1.6. This vulnerability affects unknown code of the file /UserAction.class.php. Such manipulation of the argument _order leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title EasyCMS UserAction.class.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:34:54.085Z

Reserved: 2026-01-17T08:34:03.131Z

Link: CVE-2026-1105

cve-icon Vulnrichment

Updated: 2026-01-20T17:21:56.559Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-18T00:15:49.197

Modified: 2026-02-06T20:19:46.550

Link: CVE-2026-1105

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:00:04Z

Weaknesses