Description
SSCMS v7.4.0 contains a SQL injection vulnerability in the stl:sqlContent tag where the queryString attribute is passed directly to database execution without parameterization or sanitization. Attackers can craft encrypted payloads submitted to the /api/stl/actions/dynamic endpoint to execute arbitrary SQL statements, leading to unauthorized database access, data disclosure, authentication bypass, data modification, or complete database compromise.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Fri, 01 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Siteserver
Siteserver sscms |
|
| Vendors & Products |
Siteserver
Siteserver sscms |
Thu, 30 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SSCMS v7.4.0 contains a SQL injection vulnerability in the stl:sqlContent tag where the queryString attribute is passed directly to database execution without parameterization or sanitization. Attackers can craft encrypted payloads submitted to the /api/stl/actions/dynamic endpoint to execute arbitrary SQL statements, leading to unauthorized database access, data disclosure, authentication bypass, data modification, or complete database compromise. | |
| Title | SSCMS v7.4.0 SQL Injection via stl:sqlContent queryString | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-30T20:09:17.935Z
Reserved: 2026-04-29T15:22:42.018Z
Link: CVE-2026-7435
No data.
Status : Deferred
Published: 2026-04-30T21:16:34.100
Modified: 2026-05-01T15:28:46.093
Link: CVE-2026-7435
No data.
OpenCVE Enrichment
Updated: 2026-05-01T08:21:05Z
Weaknesses