Description
A security vulnerability has been detected in jizhiCMS up to 2.5.6. Affected is the function findAll in the library frphp/lib/Model.php of the component Batch Interface. The manipulation of the argument data leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Assess Impact
AI Analysis

Impact

The flaw resides in jizhiCMS’s Model.php within the Batch interface, where improper handling of the findAll method allows an attacker to inject arbitrary SQL statements. This vulnerability matches CWE-74 and CWE-89. The attack can be carried out remotely by supplying crafted input data, potentially enabling the attacker to read, alter, or delete database content. This unauthorized data exposure or compromise could undermine sensitive user information and the integrity of the application’s data layer.

Affected Systems

The vulnerability affects installations of jizhiCMS with versions 2.5.6 or earlier. Versions beyond 2.5.6 are not listed as affected in the available information.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, while the EPSS score of less than 1% shows a very low likelihood of exploitation in the wild. The flaw is not included in CISA’s KEV catalog, and evidence suggests the attacker must interact with the web application remotely, exploiting the insufficiently sanitized input to the findAll function. Although the probability is low, the potential impact on confidentiality and integrity warrants monitoring and review.

Generated by OpenCVE AI on April 17, 2026 at 14:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update jizhiCMS to a release newer than 2.5.6 if one becomes available or seek a vendor‑provided fix.
  • If an update is not available, modify the source code of the findAll method to employ parameterized queries or explicit input sanitization.
  • Restrict network access to the Batch interface or place the CMS behind a web application firewall to filter malicious requests.
  • Conduct regular vulnerability scans and monitor logs for exploitation attempts.

Generated by OpenCVE AI on April 17, 2026 at 14:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 05:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in jizhiCMS up to 2.5.6. Affected is the function findAll in the library frphp/lib/Model.php of the component Batch Interface. The manipulation of the argument data leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title jizhiCMS Batch Model.php findAll sql injection
First Time appeared Jizhicms
Jizhicms jizhicms
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:jizhicms:jizhicms:*:*:*:*:*:*:*:*
Vendors & Products Jizhicms
Jizhicms jizhicms
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Jizhicms Jizhicms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T18:51:35.927Z

Reserved: 2026-02-26T18:24:11.553Z

Link: CVE-2026-3292

cve-icon Vulnrichment

Updated: 2026-02-27T18:51:32.273Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T05:18:21.927

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3292

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:15:21Z

Weaknesses