Description
ProjeQtor versions 7.0 through 12.4.3 contain an unauthenticated SQL injection vulnerability in the login functionality where the login variable is directly concatenated into a SQL query without parameterization or sanitization. Attackers can inject arbitrary SQL expressions through the username field at the authentication endpoint to create privileged accounts, read sensitive data, and execute operating system commands if the database user has elevated permissions.
Published: 2026-04-27
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

ProjeQtor versions between 7.0 and 12.4.3 expose a login endpoint where the username field is concatenated directly into a SQL query without any form of parameterization or sanitization. Attackers can supply a crafted username that passes through the authentication logic and inject arbitrary SQL expressions, enabling the creation of privileged user accounts, extraction of sensitive data, and, if the database account has elevated privileges, the execution of operating system commands. This flaw allows an unauthenticated user to compromise confidentiality, integrity, and availability of the system. The vulnerability is a classic SQL injection (CWE‑89).

Affected Systems

All installations of ProjeQtor from version 7.0 up to and including 12.4.3 are affected. The affected component is the authentication module that processes login requests submitted via web interfaces; the application runs under the database user account specified in the configuration. The scope extends to any system where ProjeQtor is deployed with a database user that has privileges sufficient to execute system commands.

Risk and Exploitability

The CVSS score of 9.3 classifies the issue as critical. EPSS data is not available, so a precise exploitation probability cannot be estimated, but the absence of KEV listing does not diminish the risk posed by the vulnerability. The attack can be carried out remotely by sending an unauthenticated HTTP request to the login service; the lack of input validation means an attacker does not need prior access. Exploitation would require the database user to have sufficient privileges to a degree that allows schema manipulation and, if present, OS command execution, which is often the case in default ProjeQtor deployments.

Generated by OpenCVE AI on April 28, 2026 at 04:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to ProjeQtor 12.4.4 or later, which removes the insecure concatenation from the authentication code.
  • If an upgrade is not immediately feasible, restrict access to the login endpoint by firewall rules or IP whitelisting until a patch can be applied.
  • Reconfigure the database account used by ProjeQtor to have only the minimal privileges required for normal operation; remove any rights that permit reading system tables or executing operating system commands.
  • As an interim protective step, deploy a web application firewall or input‑validation layer that blocks classic SQL injection attempts to the login field.

Generated by OpenCVE AI on April 28, 2026 at 04:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 04:45:00 +0000

Type Values Removed Values Added
First Time appeared Projeqtor
Projeqtor projeqtor
Vendors & Products Projeqtor
Projeqtor projeqtor

Mon, 27 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description ProjeQtor versions 7.0 through 12.4.3 contain an unauthenticated SQL injection vulnerability in the login functionality where the login variable is directly concatenated into a SQL query without parameterization or sanitization. Attackers can inject arbitrary SQL expressions through the username field at the authentication endpoint to create privileged accounts, read sensitive data, and execute operating system commands if the database user has elevated permissions.
Title ProjeQtor < 12.4.4 Unauthenticated SQL Injection via Login
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Projeqtor Projeqtor
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-14T02:09:47.114Z

Reserved: 2026-04-20T16:07:47.310Z

Link: CVE-2026-41462

cve-icon Vulnrichment

Updated: 2026-04-27T17:43:43.654Z

cve-icon NVD

Status : Deferred

Published: 2026-04-27T16:16:45.340

Modified: 2026-04-27T18:36:19.637

Link: CVE-2026-41462

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T04:30:21Z

Weaknesses