Description
Docpedia developed by Flowring has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
Published: 2026-02-10
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: unauthenticated read of database contents via SQL injection
Action: Patch Immediately
AI Analysis

Impact

The flaw in Flowring's Docpedia allows an unauthenticated user to inject arbitrary SQL statements into the application's database queries. By exploiting this vector the attacker can read sensitive data stored in the database, compromising confidentiality and potentially enabling further attacks.

Affected Systems

The vulnerability is present in Flowring's Docpedia application. No specific version numbers are listed, so all installed instances of Docpedia may be affected.

Risk and Exploitability

The published CVSS score of 8.7 indicates a high severity. The EPSS score of less than 1% suggests that exploitation is unlikely to be widespread, and the vulnerability is not currently listed in the CISA KEV catalog. Nevertheless, the flaw can be triggered remotely without authentication, meaning that any exposed instance of Docpedia is at risk if the patch has not been applied. An attacker could construct a payload against a publicly reachable endpoint to retrieve database contents, which could lead to data exfiltration or further lateral movement.

Generated by OpenCVE AI on April 17, 2026 at 20:54 UTC.

Remediation

Vendor Solution

Please install the patch DP4 HotFix_057.


OpenCVE Recommended Actions

  • Install the DP4 HotFix_057 patch provided by Flowring for all Docpedia installations.
  • Configure the application to require authentication before the vulnerable functionality is accessible, thereby reducing the attack surface.
  • Run a vulnerability scan on exposed Docpedia endpoints and monitor system logs for anomalous SQL query activity to detect potential exploitation attempts.

Generated by OpenCVE AI on April 17, 2026 at 20:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Flowring
Flowring docpedia
Vendors & Products Flowring
Flowring docpedia

Tue, 10 Feb 2026 07:15:00 +0000

Type Values Removed Values Added
Description Docpedia developed by Flowring has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.
Title Flowring|Docpedia - SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Flowring Docpedia
cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2026-02-10T20:15:52.312Z

Reserved: 2026-02-06T11:02:43.762Z

Link: CVE-2026-2093

cve-icon Vulnrichment

Updated: 2026-02-10T20:15:49.871Z

cve-icon NVD

Status : Deferred

Published: 2026-02-10T07:16:13.440

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2093

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:00:12Z

Weaknesses