Impact
A vulnerability in the login.php component of Easy Blog Site 1.0 allows an attacker to manipulate the username and password parameters, leading to SQL injection. This weakness can enable the execution of arbitrary SQL code, potentially granting unauthorized access to the application’s database and exposing sensitive user data. The exploit is publicly disclosed and can be triggered remotely, increasing the attack surface.
Affected Systems
The affected product is Easy Blog Site version 1.0 from code-projects. No other product or version information is specified in the CVE data.
Risk and Exploitability
With a CVSS score of 6.9, the vulnerability is considered moderate to high risk. No EPSS score or KEV listing is available, but the public disclosure and remote attack vector suggest that exploitation is plausible. An attacker could log in as any user or extract data by injecting malicious SQL through the username or password field.
OpenCVE Enrichment