Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
The vulnerability has been fixed by Schiocco team in version 3.7.8, released on February 2025.
Workaround
No workaround given by the vendor.
Thu, 26 Mar 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:schiocco:support_board:*:*:*:*:*:wordpress:*:* | |
| Metrics |
cvssV3_1
|
Wed, 25 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A SQL Injection vulnerability has been found in Support Board v3.7.7. This vulnerability allows an attacker to retrieve, create, update and delete database via 'calls[0][message_ids][]' parameter in '/supportboard/include/ajax.php' endpoint. | |
| Title | SQL Injection vulnerability in Support Board | |
| First Time appeared |
Schiocco
Schiocco support Board |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:schiocco:support_board:*:*:*:*:*:*:*:* cpe:2.3:a:schiocco:support_board:3.7.8:*:*:*:*:*:*:* |
|
| Vendors & Products |
Schiocco
Schiocco support Board |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-03-25T17:41:55.649Z
Reserved: 2026-03-25T13:28:13.496Z
Link: CVE-2026-4815
Updated: 2026-03-25T17:41:52.589Z
Status : Analyzed
Published: 2026-03-25T14:16:40.120
Modified: 2026-03-26T14:53:45.080
Link: CVE-2026-4815
No data.
OpenCVE Enrichment
Updated: 2026-03-26T11:43:08Z