Impact
An attacker can manipulate the Name parameter in the depart_add_bg.php script, allowing arbitrary SQL commands to be executed against the database. The vulnerability may be exploited remotely without authentication, leading to potential data exposure and unauthorized database access. This corresponds to CWE-89 (SQL Injection) and may also involve CWE-74 (SQL Injection via Unescaped Input).
Affected Systems
The affected product is FeMiner WMS, version 1.0 and earlier, as identified in the file /wms-master/src/basic/depart/depart_add_bg.php. No official vendor response was publicly available, and the vulnerability is currently disclosed.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate impact, and the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog, and its exploit is publicly available. Attackers can exploit it over the network by sending crafted requests to the Name parameter, achieving unauthorized SQL execution.
OpenCVE Enrichment