Description
YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin OnPost… handler executes its side effects before the ResultFilterAttribute rewrites the response to a 302 to /Info/4. The most impactful abuse is /Admin/RunSql, whose OnPostRunQuery binds Editor from the POST body and passes it straight to IDbAccess.RunSql with no caller check, yielding arbitrary SQL execution for any low-privileged user. This vulnerability is fixed in 4.0.5.
Published: 2026-05-12
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from an authorization bypass in the pre‑handler of YAF.NET’s administrative pages. Before the ResultFilterAttribute can redirect the user, the OnPost handler performs its logic without checking the caller’s privileges. On the /Admin/RunSql page, this allows a low‑privileged user to post an arbitrary SQL statement via the Editor field, which is passed directly to "IDbAccess.RunSql". The result is blind SQL execution that can read, modify, or delete any data in the database. This flaw maps to CWE‑841 (Improper Restriction of Operations within the Bounds of a User) and CWE‑89 (SQL Injection).

Affected Systems

The affected software is YAF.NET (YetAnotherForum.NET), a C# ASP.NET forum application. Versions prior to 4.0.5 contain the flaw; the issue was fixed in 4.0.5. Therefore any deployment running 4.0.4 or earlier is vulnerable.

Risk and Exploitability

The CVSS score of 8.8 classifies this as high severity, indicating significant impact. Although the EPSS score is not available, the existence of a functional exploit path—submitting an arbitrary SQL payload to /Admin/RunSql via a web request—gives attackers a realistic chance to compromise the database. The vulnerability is not yet listed in CISA’s KEV catalog, but its potential for data exfiltration or modification makes it a priority for remediation. Attackers only need authenticated access with low privileges, and the authorization bypass removes the normal admin‑level checks, making exploitation straightforward.

Generated by OpenCVE AI on May 12, 2026 at 16:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade YAF.NET to version 4.0.5 or later, which removes the pre‑handler authorization bypass.
  • Restrict or disable the /Admin/RunSql endpoint for users who do not require database query capabilities.
  • Audit database activity logs for anomalous queries that might indicate exploitation and consider implementing additional input validation or database‑level query limitations.

Generated by OpenCVE AI on May 12, 2026 at 16:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xhw7-j96h-c3g5 YAFNET: Pre-Handler Authorization Bypass on Admin Pages Enables Blind SQL Execution via `/Admin/RunSql`
History

Tue, 12 May 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 15:00:00 +0000

Type Values Removed Values Added
Description YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin OnPost… handler executes its side effects before the ResultFilterAttribute rewrites the response to a 302 to /Info/4. The most impactful abuse is /Admin/RunSql, whose OnPostRunQuery binds Editor from the POST body and passes it straight to IDbAccess.RunSql with no caller check, yielding arbitrary SQL execution for any low-privileged user. This vulnerability is fixed in 4.0.5.
Title YAF.NET: Pre-Handler Authorization Bypass on Admin Pages Enabling Blind SQL Execution via `/Admin/RunSql`
Weaknesses CWE-841
CWE-89
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-12T15:42:43.601Z

Reserved: 2026-05-04T16:59:09.089Z

Link: CVE-2026-43937

cve-icon Vulnrichment

Updated: 2026-05-12T15:41:02.427Z

cve-icon NVD

Status : Received

Published: 2026-05-12T15:16:15.327

Modified: 2026-05-12T16:16:18.740

Link: CVE-2026-43937

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T16:30:19Z

Weaknesses