Description
SQL injection in Solicitante::resetaSenha() in esiclivre/esiclivre v0.2.2 and earlier allows unauthenticated remote attackers to gain unauthorized access to sensitive information via the cpfcnpj parameter in /reset/index.php
Published: 2026-03-24
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Database disclosure via SQL injection
Action: Immediate Patch
AI Analysis

Impact

A classic SQL injection flaw exists in the reset password routine of esiclivre/esiclivre, specifically in the Solicitante::resetaSenha() method. The vulnerability is triggered by the cpfcnpj parameter in the /reset/index.php script and allows an unauthenticated attacker to manipulate SQL queries to retrieve or modify sensitive data. The flaw is a straightforward injection weakness (CWE‑89) that can compromise confidentiality and potentially integrity of the underlying database. The description indicates that any attacker who can reach the reset endpoint can exploit the flaw without needing credentials, rendering the data exposure broadly available.

Affected Systems

The affected product is esiclivre/esiclivre version 0.2.2 and all earlier releases. No specific vendor version list is supplied beyond the repository identifier, and no CNA vendor or product names are attached. Administrators should verify the exact version being deployed and confirm whether it falls within the vulnerable range. If the installation uses a newer release, the vulnerability may be mitigated by default.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity, and the EPSS score under 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities catalog, further indicating limited observed exploitation. Based on the description, the likely attack vector is a remote web request to /reset/index.php with crafted cpfcnpj input, meaning that an attacker could trigger the flaw from anywhere on the internet. Exploitation requires no special conditions beyond network reach to the web service.

Generated by OpenCVE AI on March 25, 2026 at 23:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the esiclivre version in use and upgrade to a release that has fixed the SQL injection vulnerability, if available.
  • If an official patch is not released, modify the code in Solicitante::resetaSenha() to use parameterized queries or input validation for the cpfcnpj parameter.
  • Restrict access to /reset/index.php by implementing authentication or IP filtering until the code is fixed.
  • Deploy a web application firewall rule or similar network filtering to block suspicious injection patterns targeting the cpfcnpj field.
  • Monitor application logs for unusual requests to /reset/index.php and investigate potential abuse.

Generated by OpenCVE AI on March 25, 2026 at 23:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Title SQL Injection in ResetaSenha Function Enabling Unauthenticated Remote Access Unauthenticated SQL Injection Exposing Sensitive Data in esiclivre Reset Function

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Title SQL Injection in ResetaSenha Function Enabling Unauthenticated Remote Access

Wed, 25 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:esiclivre:esiclivre:*:*:*:*:*:*:*:*

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Esiclivre
Esiclivre esiclivre
Vendors & Products Esiclivre
Esiclivre esiclivre

Tue, 24 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description SQL injection in Solicitante::resetaSenha() in esiclivre/esiclivre v0.2.2 and earlier allows unauthenticated remote attackers to gain unauthorized access to sensitive information via the cpfcnpj parameter in /reset/index.php
References

Subscriptions

Esiclivre Esiclivre
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-24T18:52:36.857Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30655

cve-icon Vulnrichment

Updated: 2026-03-24T18:52:25.868Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T15:16:34.243

Modified: 2026-03-25T20:53:47.187

Link: CVE-2026-30655

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:20:29Z

Weaknesses