Impact
A SQL injection flaw exists in the /activity/index/get-memberall endpoint of SocialEngine 7.8.0 and earlier. Unsanitized user-supplied text parameter is incorporated directly into a SQL query, allowing an unauthenticated remote attacker to read arbitrary data, reset administrator passwords, or access the Packages Manager, potentially leading to full remote code execution.
Affected Systems
The vulnerability affects all SocialEngine installations that are version 7.8.0 or lower. The affected product is SocialEngine, the vendor SocialEngine, and the specific affected versions are 7.8.0 and earlier.
Risk and Exploitability
The CVSS score of 9.3 indicates a critical severity. EPSS < 1% shows a low but non‑zero exploitation probability. The vulnerability is not listed in the CISA KEV catalog. An attacker can exploit the flaw from outside the network by sending crafted requests to the vulnerable endpoint; no authentication is required.
OpenCVE Enrichment