Impact
The vulnerability resides in the list function of the ContentAction class in the Web Content List Endpoint and allows a malicious actor to inject arbitrary SQL statements by manipulating request parameters. This type of injection can lead to data exposure, data modification, or denial of service by exploiting the underlying database. It is classified as a classic SQL injection flaw due to unsanitized input handling.
Affected Systems
The affected product is mingSoft MCMS, specifically all releases up to and including version 5.5.0. The vulnerable code is located in net/mingsoft/cms/action/web/ContentAction.java, part of the Web Content List Endpoint component.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, reflecting the potential for significant data compromise without requiring privilege escalation. The EPSS score is not available, so the likelihood of exploitation cannot be precisely quantified, but the vulnerability is publicly disclosed and can be triggered remotely without any special permissions. The vulnerability is not currently listed in the CISA KeV catalog. An attacker could exploit the flaw by sending crafted HTTP requests to the list endpoint, thereby injecting SQL commands and extracting or manipulating data.
OpenCVE Enrichment