Description
A vulnerability was detected in JiZhiCMS up to 2.5.6. The impacted element is the function htmlspecialchars_decode of the file /index.php/admins/Sys/addcache.html. The manipulation of the argument sqls results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-25
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Assess
AI Analysis

Impact

A flaw exists in JiZhiCMS versions up to 2.5.6 within the htmlspecialchars_decode function in /index.php/admins/Sys/addcache.html, where the sqls argument is not properly sanitized, enabling the injection of arbitrary SQL statements. This leads to execution of malicious database commands, allowing an attacker to retrieve, modify, or delete data, thereby compromising database confidentiality, integrity, and availability. The attack does not depend on any session state or CSRF token, enabling it to be triggered by a simple HTTP request to the vulnerable endpoint.

Affected Systems

All JiZhiCMS installations running any release version through 2.5.6 are potentially affected. The vulnerable code resides in the addcache.html subsystem of the administrative interface. No other vendors or product versions are listed in the CNA data.

Risk and Exploitability

The CVSS score of 5.1 indicates medium severity, while the EPSS score of less than 1% reflects a low probability of exploitation in the wild. The vulnerability is not catalogued in the CISA KEV list. Because the flaw is remotely exploitable via the sqls parameter and a public exploit exists, an attacker could gain unauthorized database access if the compromised CMS instance is exposed to the internet and proper access controls are not in place.

Generated by OpenCVE AI on April 28, 2026 at 13:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Restrict access to the /index.php/admins/Sys/addcache.html administrative endpoint to trusted IP ranges or protect it with strong authentication, ideally multi‑factor.
  • Implement proper input validation and replace the current htmlspecialchars_decode usage with parameterized SQL queries or stored procedures that do not interpolate user data.
  • Deploy a Web Application Firewall or intrusion detection rules to detect and block suspicious SQL payloads targeting the sqls parameter, and monitor server logs for abnormal query activity.

Generated by OpenCVE AI on April 28, 2026 at 13:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 25 Apr 2026 12:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in JiZhiCMS up to 2.5.6. The impacted element is the function htmlspecialchars_decode of the file /index.php/admins/Sys/addcache.html. The manipulation of the argument sqls results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title JiZhiCMS addcache.html htmlspecialchars_decode sql injection
First Time appeared Jizhicms
Jizhicms jizhicms
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:jizhicms:jizhicms:*:*:*:*:*:*:*:*
Vendors & Products Jizhicms
Jizhicms jizhicms
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Jizhicms Jizhicms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:43:45.138Z

Reserved: 2026-04-24T18:52:18.511Z

Link: CVE-2026-6978

cve-icon Vulnrichment

Updated: 2026-04-27T13:43:38.255Z

cve-icon NVD

Status : Deferred

Published: 2026-04-25T12:15:59.237

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6978

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T13:30:32Z

Weaknesses