CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability was found in code-projects/anirbandutta9 Content Management System and News-Buzz 1.0. It has been classified as critical. Affected is an unknown function of the file /publicposts.php. The manipulation of the argument post leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical SQL injection vulnerability in the /publicposts.php file of Content Management System and News-Buzz version 1.0 by code-projects/anirbandutta9. The vulnerability allows unauthenticated remote attackers to inject arbitrary SQL commands through the 'post' parameter, potentially enabling unauthorized data access, modification, or deletion. A public exploit has been disclosed and the vulnerability is exploitable with low attack complexity, making it an active threat.
Technical Context
This vulnerability is a classic SQL injection flaw (CWE-74: Improper Neutralization of Special Elements used in an Output ['Injection']) affecting PHP-based content management systems. The /publicposts.php endpoint fails to properly sanitize or parameterize user-supplied input in the 'post' parameter before incorporating it into SQL queries. The affected product is a lightweight CMS/news platform (News-Buzz 1.0) maintained by code-projects/anirbandutta9. The root cause stems from missing input validation and the absence of prepared statements or parameterized queries, allowing direct SQL command injection. CPE identification suggests: cpe:2.3:a:code-projects:anirbandutta9_cms_and_news-buzz:1.0:*:*:*:*:*:*:*
Affected Products
- product: Content Management System and News-Buzz; vendor: code-projects/anirbandutta9; affected_version: 1.0; component: /publicposts.php; vulnerable_parameter: post; cpe: cpe:2.3:a:code-projects:anirbandutta9_cms_and_news-buzz:1.0:*:*:*:*:*:*:*
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-16957