Description
A security vulnerability has been detected in Alixhan xh-admin-backend up to 1.7.0. This issue affects some unknown processing of the file /frontend-api/system-service/api/system/role/query of the component Database Query Handler. Such manipulation of the argument prop leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-18
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted Data Access and Potential Modification via Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A vulnerability exists in the Alixhan xh-admin-backend component that allows an attacker to manipulate the request argument sent to the /frontend-api/system-service/api/system/role/query endpoint. This manipulation leads to unparameterized SQL queries, enabling an attacker to execute arbitrary SQL statements. The primary impact of exploiting this flaw is unauthorized data exposure, potential data modification, and possible privilege escalation if the database user has elevated rights. The weakness is classified under CWE-74 and CWE-89, indicating raw data usage in a database query without proper sanitization.

Affected Systems

The affected product is Alixhan xh-admin-backend version 1.7.0 and prior releases. Users running any version up to 1.7.0 should consider themselves at risk, as the flaw resides in the Database Query Handler processing component.

Risk and Exploitability

The CVSS score of 5.3 denotes medium severity, and the EPSS score indicates a very low likelihood of automated exploitation at the current report time, though the vulnerability has been publicly disclosed. Attackers can launch the exploit remotely by sending crafted HTTP requests to the vulnerable endpoint; no local prerequisites are documented. The vulnerability is not listed in the CISA KEV catalog, but the public disclosure suggests it is actively known in the community.

Generated by OpenCVE AI on April 17, 2026 at 18:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Alixhan xh-admin-backend to a version newer than 1.7.0 that contains the fix for the SQL injection flaw.
  • If an upgrade is not immediately possible, implement input validation or parameterized query handling for the /frontend-api/system-service/api/system/role/query endpoint to prevent raw user input from reaching the database layer.
  • Restrict the database account used by the backend to only the minimum privileges required for normal operation, thereby limiting the potential impact if an injection succeeds.

Generated by OpenCVE AI on April 17, 2026 at 18:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Alixhan
Alixhan xh-admin-backend
Vendors & Products Alixhan
Alixhan xh-admin-backend

Wed, 18 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Alixhan xh-admin-backend up to 1.7.0. This issue affects some unknown processing of the file /frontend-api/system-service/api/system/role/query of the component Database Query Handler. Such manipulation of the argument prop leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Alixhan xh-admin-backend Database Query query sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Alixhan Xh-admin-backend
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:19:26.187Z

Reserved: 2026-02-18T07:43:08.772Z

Link: CVE-2026-2663

cve-icon Vulnrichment

Updated: 2026-02-18T20:04:14.165Z

cve-icon NVD

Status : Deferred

Published: 2026-02-18T20:18:36.817

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2663

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:45:25Z

Weaknesses