Description
A security flaw has been discovered in EasyCMS up to 1.6. The impacted element is an unknown function of the file /RbacuserAction.class.php of the component Request Parameter Handler. The manipulation of the argument _order results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection via _order parameter in EasyCMS RbacuserAction.class.php
Action: Apply Patch
AI Analysis

Impact

An SQL injection vulnerability exists in EasyCMS up to version 1.6. The flaw lies in the handling of the _order argument within the file /RbacuserAction.class.php. By manipulating this parameter, an attacker can inject arbitrary SQL code, potentially reading, modifying, or deleting data in the database. The weakness is classified under CWE‑74 and CWE‑89.

Affected Systems

The vulnerability affects EasyCMS installations running any version up to and including 1.6. No specific minor releases are listed; affected hosts may be discovering this flaw as part of the component Request Parameter Handler.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate risk, but the vulnerability can be exploited remotely and the exploit code is publicly available. EPSS is below 1 %, suggesting rare exploitation so far, and the issue is not currently listed in the CISA KEV catalog. Nevertheless, the presence of a public exploit and the ability to compromise database integrity warrants immediate attention. Attackers would need network access to the web application and supply a crafted _order value to manipulate the query.

Generated by OpenCVE AI on April 16, 2026 at 04:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and apply the vendor's security patch for EasyCMS 1.6 or newer that fixes the SQL injection in RbacuserAction.class.php.
  • If a patch cannot be applied immediately, limit access to the /RbacuserAction.class.php endpoint to trusted administrators using web‑server or firewall rules.
  • Add strict input validation for the _order parameter so that it accepts only expected values (e.g., numeric identifiers or a whitelist of column names) before it is used in database queries.

Generated by OpenCVE AI on April 16, 2026 at 04:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 08 Mar 2026 22:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in EasyCMS up to 1.6. The impacted element is an unknown function of the file /RbacuserAction.class.php of the component Request Parameter Handler. The manipulation of the argument _order results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title EasyCMS Request Parameter RbacuserAction.class.php sql injection
First Time appeared Easycms
Easycms easycms
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:easycms:easycms:*:*:*:*:*:*:*:*
Vendors & Products Easycms
Easycms easycms
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T20:23:49.970Z

Reserved: 2026-03-08T07:03:30.189Z

Link: CVE-2026-3786

cve-icon Vulnrichment

Updated: 2026-03-10T20:23:43.454Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T23:15:50.477

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3786

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:15:24Z

Weaknesses