Description
A vulnerability was identified in z-9527 admin 1.0/2.0. The affected element is the function checkName/register/login/getUser/getUsers of the file /server/controller/user.js. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-25
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Compromise
Action: Assess Impact
AI Analysis

Impact

A vulnerability in the /server/controller/user.js file of z‑9527 admin 1.0 and 2.0 allows an attacker to inject arbitrary SQL through the checkName, register, login, getUser, and getUsers endpoints. This flaw enables the retrieval or alteration of database contents, potentially exposing sensitive user data or modifying critical application state. The weakness is identified as a classic injection flaw, documented under CWE‑74 and CWE‑89.

Affected Systems

The affected product is z‑9527 admin version 1.0 and 2.0. The CVE data does not indicate a publicly available patch or update from the vendor, and vendor contact has not resulted in a response. The product is distributed via the public repositories linked in the advisory.

Risk and Exploitability

The vulnerability has a CVSS v3.1 score of 6.9, which denotes moderate severity. The EPSS score is below 1%, indicating a low but non‑zero likelihood of exploitation. It is not listed in the CISA Known Exploited Vulnerabilities catalog. Because the attack can be triggered remotely against exposed endpoints, any instance of the affected software exposed to the internet remains at risk for data compromise until mitigation measures are applied.

Generated by OpenCVE AI on April 18, 2026 at 17:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Identify all installations of z‑9527 admin 1.0 or 2.0 within the environment.
  • For each instance, check for available vendor fixes or contact the vendor for an official patch update. If no patch is provided, restrict access to the /server/controller/user.js endpoints by limiting exposure to trusted networks or enforcing strict authentication and application‑level firewalls.
  • Implement defensive coding practices by updating the affected code to use parameterized queries or prepared statements for all database interactions in checkName, register, login, getUser, and getUsers.
  • Monitor database activity logs for anomalous queries and investigate any suspicious events promptly.

Generated by OpenCVE AI on April 18, 2026 at 17:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Z-9527
Z-9527 admin
Vendors & Products Z-9527
Z-9527 admin

Wed, 25 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in z-9527 admin 1.0/2.0. The affected element is the function checkName/register/login/getUser/getUsers of the file /server/controller/user.js. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title z-9527 admin user.js getUsers sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T17:57:56.330Z

Reserved: 2026-02-25T14:04:07.653Z

Link: CVE-2026-3200

cve-icon Vulnrichment

Updated: 2026-02-27T17:57:52.572Z

cve-icon NVD

Status : Deferred

Published: 2026-02-25T21:16:45.337

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-3200

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:45:06Z

Weaknesses