SQL Injection

web HIGH

SQL injection exploits the way applications construct database queries by mixing user input directly into SQL statements.

How It Works

SQL injection exploits the way applications construct database queries by mixing user input directly into SQL statements. When developers concatenate untrusted data into queries without proper sanitization, attackers can inject SQL syntax that changes the query's logic. For example, entering ' OR '1'='1 into a login form might transform SELECT * FROM users WHERE username='input' into a query that always returns true, bypassing authentication.

Attackers follow a methodical process: first probing input fields with special characters like quotes or semicolons to trigger database errors, then identifying whether the application is vulnerable. Once confirmed, they escalate by injecting commands to extract data (UNION-based attacks to merge results from other tables), manipulate records, or probe the database structure. Blind SQL injection variants work without visible error messages—boolean-based attacks infer data by observing application behavior changes, while time-based attacks use database sleep functions to confirm successful injection through response delays.

Advanced scenarios include second-order injection, where malicious input is stored in the database and later executed in a different context, and out-of-band attacks that exfiltrate data through DNS queries or HTTP requests when direct data retrieval isn't possible. Some database systems enable attackers to execute operating system commands through built-in functions like MySQL's LOAD_FILE or SQL Server's xp_cmdshell, escalating from database compromise to full server control.

Impact

  • Complete data breach — extraction of entire database contents including credentials, personal information, and proprietary data
  • Authentication bypass — logging in as any user without knowing passwords
  • Data manipulation — unauthorized modification or deletion of critical records
  • Privilege escalation — granting administrative rights to attacker-controlled accounts
  • Remote code execution — leveraging database features to run operating system commands and compromise the underlying server
  • Lateral movement — using compromised database credentials to access other connected systems

Real-World Examples

FreePBX's CVE-2025-66039 demonstrated a complete attack chain where SQL injection across 11 parameters in four different endpoints allowed attackers to write malicious entries into the cron_jobs table. When the system's scheduler executed these entries, the injected SQL transformed into operating system commands, granting full server control. The vulnerability required no authentication, making it immediately exploitable.

E-commerce platforms have suffered massive breaches through shopping cart SQL injection, where attackers inserted skimming code into stored procedures that executed during checkout, harvesting credit card data from thousands of transactions. Healthcare systems have been compromised through patient portal vulnerabilities, exposing millions of medical records when attackers injected UNION queries to merge data from supposedly isolated tables.

Mitigation

  • Parameterized queries (prepared statements) — separates SQL logic from data, making injection syntactically impossible
  • Object-Relational Mapping (ORM) frameworks — abstracts database interactions with built-in protections when used correctly
  • Strict input validation — whitelist acceptable characters and formats, reject suspicious patterns
  • Least privilege database accounts — applications should use credentials with minimal necessary permissions
  • Web Application Firewall (WAF) — detects and blocks common injection patterns as a secondary defense layer
  • Database activity monitoring — alerts on unusual query patterns or privilege escalation attempts

Recent CVEs (4535)

CVE-2025-4686
EPSS 0% CVSS 8.6
HIGH This Week

Kodmatic Computer Software Tourism Construction Industry and Trade Ltd. Co. Online Exam and Assessment is affected by sql injection (CVSS 8.6).

SQLi
NVD
CVE-2026-1595
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode Society Management System 1.0 allows unauthenticated remote attackers to manipulate the student_id parameter in /admin/edit_student_query.php, enabling unauthorized database queries and potential data exfiltration or modification. Public exploit code exists for this vulnerability, and no patch is currently available, increasing the risk of active exploitation.

PHP SQLi Society Management System
NVD GitHub VulDB
CVE-2026-1594
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode Society Management System 1.0's expense administration interface allows unauthenticated remote attackers to manipulate the detail parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and no patch is currently available. Affected systems expose confidentiality, integrity, and availability of underlying data.

PHP SQLi Society Management System
NVD GitHub VulDB
CVE-2026-1593
EPSS 0% CVSS 7.3
HIGH POC This Week

Society Management System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 7.3).

PHP SQLi Society Management System
NVD GitHub VulDB
CVE-2026-1590
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode School Management System 1.0 via the ID parameter in /ramonsys/faculty/index.php enables unauthenticated remote attackers to read, modify, or delete database contents. Public exploit code exists for this vulnerability, and no patch is currently available.

PHP SQLi School Management System
NVD VulDB
CVE-2026-1589
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode School Management System 1.0 via the txtsearch parameter in /ramonsys/inquiry/index.php enables unauthenticated remote attackers to execute arbitrary SQL queries with limited impact on confidentiality, integrity, and availability. Public exploit code exists for this vulnerability, and no patch is currently available.

PHP SQLi School Management System
NVD VulDB
CVE-2025-7714
EPSS 0% CVSS 7.5
HIGH This Week

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Global Interactive Design Media Software Inc. [CVSS 7.5 HIGH]

SQLi Content Management System
NVD
CVE-2020-37006
EPSS 0% CVSS 8.2
HIGH POC This Week

berliCRM 1.0.24 contains a SQL injection vulnerability in the 'src_record' parameter that allows remote attackers to manipulate database queries. Attackers can inject malicious SQL code through a crafted POST request to the index.php endpoint to potentially extract or modify database information. [CVSS 8.2 HIGH]

PHP SQLi
NVD Exploit-DB
CVE-2020-37005
EPSS 0% CVSS 7.1
HIGH POC This Week

TimeClock Software 1.01 contains an authenticated time-based SQL injection vulnerability that allows attackers to enumerate valid usernames by manipulating the 'notes' parameter. [CVSS 7.1 HIGH]

PHP SQLi
NVD Exploit-DB
CVE-2020-37004
EPSS 0% CVSS 8.2
HIGH POC This Week

Ultimate Project Manager CRM PRO 2.0.5 contains a blind SQL injection vulnerability that allows attackers to extract usernames and password hashes from the tbl_users database table. [CVSS 8.2 HIGH]

SQLi
NVD Exploit-DB
CVE-2020-36999
EPSS 0% CVSS 8.2
HIGH POC This Week

Elaniin CMS 1.0 contains an authentication bypass vulnerability that allows attackers to access the dashboard by manipulating the login page with SQL injection. [CVSS 8.2 HIGH]

PHP SQLi Authentication Bypass
NVD GitHub Exploit-DB
CVE-2026-1552
EPSS 0% CVSS 6.3
MEDIUM POC This Month

SQL injection in SEMCMS 5.0 via the searchml parameter in /SEMCMS_Info.php allows authenticated attackers to execute arbitrary SQL queries remotely. Public exploit code exists for this vulnerability, and no patch is currently available from the vendor despite early disclosure notification.

PHP SQLi Semcms
NVD GitHub VulDB
CVE-2026-1551
EPSS 0% CVSS 6.3
MEDIUM POC This Month

School Management System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 6.3).

PHP SQLi School Management System
NVD VulDB
CVE-2025-15344
EPSS 0% CVSS 6.3
MEDIUM This Month

Tanium addressed a SQL injection vulnerability in Asset. [CVSS 6.3 MEDIUM]

SQLi Asset
NVD
CVE-2026-1546
EPSS 0% CVSS 6.3
MEDIUM POC This Month

SQL injection in jshERP up to version 3.6 allows authenticated remote attackers to manipulate the barCodes parameter in the DepotItem import function, potentially enabling unauthorized data access or modification. Public exploit code exists for this vulnerability, and no patch is currently available. The vendor has not responded to early notification of this issue.

SQLi Jsherp
NVD GitHub VulDB
CVE-2026-1545
EPSS 0% CVSS 7.3
HIGH POC This Week

School Management System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 7.3).

PHP SQLi School Management System
NVD GitHub VulDB
CVE-2026-1535
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in Online Music Site 1.0's AdminReply.php allows unauthenticated remote attackers to manipulate the ID parameter and execute arbitrary SQL queries, potentially compromising database confidentiality and integrity. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected installations at immediate risk.

PHP SQLi Online Music Site
NVD GitHub VulDB
CVE-2026-1534
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in Online Music Site 1.0's AdminEditUser.php allows unauthenticated remote attackers to manipulate the ID parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, enabling potential data theft, modification, or service disruption. No patch is currently available, leaving affected installations vulnerable.

PHP SQLi Online Music Site
NVD GitHub VulDB
CVE-2026-1533
EPSS 0% CVSS 4.7
MEDIUM POC This Month

SQL injection in Online Music Site 1.0's AdminAddCategory.php allows remote attackers with high privileges to execute arbitrary SQL queries and potentially access or modify sensitive data. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. No patch is currently available.

PHP SQLi Online Music Site
NVD GitHub VulDB
CVE-2025-57793
EPSS 0% CVSS 8.6
HIGH This Week

Explorance Blue versions prior to 8.14.9 contain a SQL injection vulnerability caused by insufficient validation of user-supplied input in a web application component. Crafted input can be executed as part of backend database queries. [CVSS 8.6 HIGH]

SQLi Blue
NVD GitHub
CVE-2025-57792
EPSS 0% CVSS 10.0
CRITICAL Act Now

Explorance Blue versions before 8.14.9 have a CVSS 10.0 SQL injection vulnerability enabling unauthenticated attackers to fully compromise the survey and assessment database.

SQLi Blue
NVD GitHub
CVE-2020-36972
EPSS 0% CVSS 8.2
HIGH POC This Week

SmartBlog 2.0.1 contains a blind SQL injection vulnerability in the 'id_post' parameter of the details controller that allows attackers to extract database information. [CVSS 8.2 HIGH]

SQLi Smartblog
NVD GitHub Exploit-DB
CVE-2020-36945
EPSS 0% CVSS 8.2
HIGH POC This Week

WebDamn User Registration Login System contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login authentication by manipulating email credentials. [CVSS 8.2 HIGH]

SQLi
NVD Exploit-DB
CVE-2026-22243
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

SQL injection in EGroupware's Nextmatch filter allows authenticated attackers to execute arbitrary database commands by exploiting PHP type juggling that bypasses integer validation checks. Public exploit code exists for this vulnerability affecting EGroupware versions prior to 23.1.20260113 and 26.0.20260113, and no patch is currently available. Attackers with valid credentials can manipulate WHERE clauses to extract sensitive data, modify records, or compromise database integrity.

PHP SQLi Egroupware
NVD GitHub
CVE-2026-0702
EPSS 0% CVSS 7.5
HIGH This Week

Unauthenticated attackers can exploit time-based SQL injection in the VidShop plugin for WordPress (versions up to 1.1.4) through the unescaped 'fields' parameter to extract sensitive database information. The vulnerability stems from insufficient input validation and improper query preparation, allowing attackers to inject malicious SQL commands without authentication. No patch is currently available for this high-severity flaw affecting WooCommerce installations.

WordPress SQLi
NVD
CVE-2026-1483
EPSS 0% CVSS 7.5
HIGH This Week

Out-of-band SQL injection in the Evaluacion De Desempeno application's 'Id_usuario' parameter allows unauthenticated remote attackers to extract sensitive database information through covert channels, bypassing normal application output mechanisms. This vulnerability affects the '/evaluacion_objetivos_ver_auto.aspx' endpoint and compromises data confidentiality with no patch currently available.

SQLi Evaluacion De Desempeno
NVD
CVE-2026-1482
EPSS 0% CVSS 7.5
HIGH This Week

Unauthenticated attackers can exploit an out-of-band SQL injection flaw in the Evaluacion De Desempeno application's 'Id_evaluacion' parameter to extract sensitive database information through indirect data exfiltration channels. This network-accessible vulnerability requires no user interaction and affects all instances without authentication controls, potentially exposing confidential evaluation records. No patch is currently available.

SQLi Evaluacion De Desempeno
NVD
CVE-2026-1481
EPSS 0% CVSS 7.5
HIGH This Week

Out-of-band SQL injection in the Performance Evaluation (Evaluacion De Desempeno) application allows unauthenticated remote attackers to extract sensitive database information through the 'Id_usuario' parameter in '/evaluacion_objetivos_anyo_sig_ver_auto.aspx' by exfiltrating data via external channels. The vulnerability compromises data confidentiality without requiring user interaction, affecting all deployments of the affected application. No patch is currently available.

SQLi Evaluacion De Desempeno
NVD
CVE-2026-1480
EPSS 0% CVSS 7.5
HIGH This Week

Out-of-band SQL injection in the Evaluacion De Desempeno application's 'Id_usuario' parameter allows unauthenticated remote attackers to extract sensitive database information through external data exfiltration channels. This vulnerability affects the '/evaluacion_objetivos_anyo_sig_evalua.aspx' endpoint and compromises confidentiality without requiring user interaction. No patch is currently available.

SQLi Evaluacion De Desempeno
NVD
CVE-2026-1479
EPSS 0% CVSS 7.5
HIGH This Week

Out-of-band SQL injection in Evaluacion De Desempeno's '/evaluacion_hca_ver_auto.asp' endpoint allows unauthenticated remote attackers to extract sensitive database information through the 'Id_usuario' and 'Id_evaluacion' parameters. The vulnerability compromises confidentiality by enabling data exfiltration via covert channels without requiring direct application responses. No patch is currently available for affected deployments.

SQLi Evaluacion De Desempeno
NVD
CVE-2026-1478
EPSS 0% CVSS 7.5
HIGH This Week

Unauthenticated attackers can exploit an out-of-band SQL injection flaw in the Performance Evaluation (EDD) application via the 'Id_usuario' and 'Id_evaluacion' parameters to extract sensitive database information through external channels, compromising data confidentiality. The vulnerability requires no user interaction and is remotely exploitable from the network. No patch is currently available.

SQLi Evaluacion De Desempeno
NVD
CVE-2026-1477
EPSS 0% CVSS 7.5
HIGH This Week

Out-of-band SQL injection in the Evaluacion De Desempeno application allows unauthenticated remote attackers to extract sensitive database information through the 'Id_usuario' and 'Id_evaluacion' parameters in the '/evaluacion_competencias_evalua_old.aspx' endpoint. An attacker can bypass normal application output channels to exfiltrate confidential data, compromising database confidentiality. No patch is currently available for this vulnerability.

SQLi Evaluacion De Desempeno
NVD
CVE-2026-1476
EPSS 0% CVSS 7.5
HIGH This Week

Out-of-band SQL injection in the Evaluacion De Desempeno application's 'Id_usuario' parameter allows unauthenticated remote attackers to extract sensitive database information through indirect data exfiltration channels. This vulnerability in the '/evaluacion_acciones_ver_auto.aspx' endpoint compromises the confidentiality of stored data without requiring user interaction. No patch is currently available for this HIGH severity vulnerability.

SQLi Evaluacion De Desempeno
NVD
CVE-2026-1475
EPSS 0% CVSS 7.5
HIGH This Week

Unauthenticated attackers can extract sensitive database information from the Evaluacion De Desempeno application through an out-of-band SQL injection vulnerability in the 'Id_usuario' parameter of '/evaluacion_acciones_evalua.aspx'. The vulnerability allows data exfiltration via external channels without direct application responses, compromising database confidentiality. No patch is currently available for this high-severity flaw.

SQLi Evaluacion De Desempeno
NVD
CVE-2026-1474
EPSS 0% CVSS 7.5
HIGH This Week

Out-of-band SQL injection in the Performance Evaluation (EDD) application allows unauthenticated remote attackers to extract sensitive database information through the 'Id_usuario' and 'Id_evaluacion' parameters in '/evaluacion_inicio.aspx'. An attacker can exfiltrate confidential data via external channels without direct application feedback, compromising data confidentiality. No patch is currently available for this vulnerability.

SQLi Evaluacion De Desempeno
NVD
CVE-2026-1473
EPSS 0% CVSS 7.5
HIGH This Week

Out-of-band SQL injection in the Evaluacion De Desempeno application's 'Id_usuario' parameter allows unauthenticated remote attackers to exfiltrate sensitive database information through covert channels. The vulnerability affects the '/evaluacion_competencias_evalua.aspx' endpoint and enables unauthorized access to confidential data despite the application not directly returning query results. No patch is currently available for this HIGH severity vulnerability.

SQLi Evaluacion De Desempeno
NVD
CVE-2026-1472
EPSS 0% CVSS 7.5
HIGH This Week

Out-of-band SQL injection in the Evaluacion De Desempeno application allows unauthenticated remote attackers to extract sensitive database information through the 'txAny' parameter in '/evaluacion_competencias_autoeval_list.aspx' without direct output reflection. By leveraging external data channels, an attacker can bypass normal application responses to exfiltrate confidential data and compromise database confidentiality. No patch is currently available for this vulnerability.

SQLi Evaluacion De Desempeno
NVD
CVE-2025-69564
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Mobile Shop Management System has code injection in ExAddNewUser.php.

PHP SQLi Mobile Shop Management System
NVD GitHub
CVE-2025-69563
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Mobile Shop Management System has SQL injection in ExLogin.php.

PHP SQLi Mobile Shop Management System
NVD GitHub
CVE-2025-69562
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Mobile Shop Management System has SQL injection in insertmessage.php.

PHP SQLi Mobile Shop Management System
NVD GitHub
CVE-2021-47902
EPSS 0% CVSS 8.2
HIGH POC This Week

Testa Online Test Management System 3.4.7 contains a SQL injection vulnerability that allows attackers to manipulate database queries through the 'q' search parameter. [CVSS 8.2 HIGH]

SQLi
NVD Exploit-DB
CVE-2020-36951
EPSS 0% CVSS 8.2
HIGH POC This Week

Phpscript-sgh 0.1.0 contains a time-based blind SQL injection vulnerability in the admin interface that allows attackers to manipulate database queries through the 'id' parameter. [CVSS 8.2 HIGH]

SQLi
NVD GitHub Exploit-DB
CVE-2020-36947
EPSS 0% CVSS 7.1
HIGH POC This Week

LibreNMS 1.46 contains an authenticated SQL injection vulnerability in the MAC accounting graph endpoint that allows remote attackers to extract database information. [CVSS 7.1 HIGH]

SQLi Librenms
NVD GitHub Exploit-DB
CVE-2026-1449
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Hisense TransTech Smart Bus Management System through version 20260113 allows unauthenticated remote attackers to manipulate the key parameter in the TireMng.aspx Page_Load function and execute arbitrary database queries. Public exploit code exists for this vulnerability, and the vendor has not provided a patch or responded to disclosure attempts. An attacker can exploit this over the network without authentication to read, modify, or delete sensitive data.

SQLi
NVD GitHub VulDB
CVE-2025-59473
EPSS 0% CVSS 7.2
HIGH This Week

SQL Injection vulnerability in the Structure for Admin authenticated user [CVSS 7.2 HIGH]

SQLi Expressionengine
NVD
CVE-2026-1443
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in Online Music Site 1.0's AdminDeleteUser.php allows unauthenticated remote attackers to manipulate the ID parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and no patch is currently available. An attacker can leverage this to compromise data confidentiality, integrity, and availability.

PHP SQLi Online Music Site
NVD GitHub VulDB
CVE-2025-59105
EPSS 0%
Monitor

With physical access to the device and enough time an attacker can desolder the flash memory, modify it and then reinstall it because of missing encryption.

Linux Windows Ssh +1
NVD
CVE-2025-59100
EPSS 0%
Monitor

The web interface offers a functionality to export the internal SQLite database. After executing the database export, an automatic download is started and the device reboots.

SQLi
NVD
CVE-2025-59099
EPSS 0%
Monitor

The Access Manager is using the open source web server CompactWebServer written in C#. This web server is affected by a path traversal vulnerability, which allows an attacker to directly access files via simple GET requests without prior authentication.

SQLi Denial Of Service Path Traversal
NVD
CVE-2026-1422
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in the login page of code-projects Online Examination System 1.0 allows unauthenticated remote attackers to manipulate the User parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires no user interaction and affects confidentiality, integrity, and availability of the affected system.

PHP SQLi Online Examination System
NVD GitHub VulDB
CVE-2025-14973
EPSS 0% CVSS 6.8
MEDIUM This Month

The Recipe Card Blocks Lite WordPress plugin before 3.4.13 does not sanitize and escape a parameter before using it in a SQL statement, allowing contributors and above to perform SQL injection attacks. [CVSS 6.8 MEDIUM]

WordPress SQLi PHP
NVD WPScan
CVE-2026-0806
EPSS 0% CVSS 4.9
MEDIUM This Month

SQL injection in the WP-ClanWars WordPress plugin through version 2.0.1 allows authenticated administrators to execute arbitrary SQL queries via an unescaped 'orderby' parameter, enabling extraction of sensitive database information. The vulnerability requires high-level administrative privileges and does not allow data modification or system availability impacts. No patch is currently available for this issue.

WordPress SQLi
NVD
CVE-2025-52025
EPSS 0% CVSS 9.4
CRITICAL Act Now

Aptsys gemscms POS Platform has a SQL injection in the GetServiceByRestaurantID endpoint allowing extraction of restaurant and payment data.

SQLi Gemscms Backend
NVD GitHub
CVE-2026-24624
EPSS 0% CVSS 7.2
HIGH This Week

Blind SQL injection in Neoforum version 1.0 and earlier allows high-privileged attackers to execute arbitrary SQL commands over the network without user interaction, potentially compromising data confidentiality and integrity. The vulnerability stems from inadequate sanitization of user inputs in SQL queries, and no patch is currently available.

SQLi
NVD
CVE-2026-24572
EPSS 0% CVSS 8.8
HIGH This Week

Nelio Content versions 4.1.0 and earlier contain a blind SQL injection vulnerability that allows authenticated attackers to execute arbitrary database queries over the network. This vulnerability requires valid user credentials but no user interaction, enabling attackers to read, modify, or delete sensitive database contents. No patch is currently available to address this high-severity flaw.

SQLi
NVD
CVE-2026-0603
EPSS 0% CVSS 8.3
HIGH PATCH This Week

Hibernate's InlineIdsOrClauseBuilder is vulnerable to second-order SQL injection when processing non-alphanumeric characters in ID columns, allowing authenticated attackers to read sensitive data, modify database contents, or cause denial of service. The vulnerability requires low privileges and network access with no user interaction, making it exploitable by remote attackers with valid credentials. No patch is currently available.

SQLi Denial Of Service Information Disclosure +1
NVD HeroDevs VulDB
CVE-2026-24367
EPSS 0% CVSS 8.8
HIGH This Week

Blind SQL injection in shinetheme Traveler versions before 3.2.8 enables authenticated attackers to extract sensitive database information through manipulated SQL queries. An attacker with valid credentials can exploit this vulnerability to read, modify, or delete arbitrary data with no user interaction required. No patch is currently available.

SQLi
NVD
CVE-2026-22470
EPSS 0% CVSS 7.6
HIGH This Week

FireStorm Plugins FireStorm Professional Real Estate fs-real-estate-plugin is affected by sql injection (CVSS 7.6).

SQLi
NVD
CVE-2025-69180
EPSS 0% CVSS 8.8
HIGH This Week

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in themepassion Ultra Portfolio ultra-portfolio allows Blind SQL Injection.This issue affects Ultra Portfolio: from n/a through <= 6.7. [CVSS 8.8 HIGH]

SQLi
NVD
CVE-2025-69045
EPSS 0% CVSS 8.5
HIGH This Week

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in FooEvents FooEvents for WooCommerce fooevents allows SQL Injection.This issue affects FooEvents for WooCommerce: from n/a through <= 1.20.4. [CVSS 8.5 HIGH]

WordPress SQLi PHP
NVD
CVE-2025-68999
EPSS 0% CVSS 8.5
HIGH This Week

HappyMonster Happy Addons for Elementor happy-elementor-addons is affected by sql injection (CVSS 8.5).

SQLi
NVD
CVE-2025-68881
EPSS 0% CVSS 8.5
HIGH This Week

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saad Iqbal AppExperts appexperts allows SQL Injection.This issue affects AppExperts: from n/a through <= 1.4.5. [CVSS 8.5 HIGH]

SQLi
NVD
CVE-2025-68857
EPSS 0% CVSS 9.3
CRITICAL Act Now

Paid Downloads WordPress plugin has a SQL injection vulnerability enabling database compromise through the download management functionality.

SQLi
NVD
CVE-2025-68034
EPSS 0% CVSS 9.3
CRITICAL Act Now

CleverReach WordPress plugin has a SQL injection vulnerability allowing attackers to extract email marketing data and WordPress credentials from the database.

SQLi
NVD
CVE-2025-68017
EPSS 0% CVSS 7.5
HIGH This Week

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Antideo Antideo Email Validator antideo-email-validator allows Blind SQL Injection.This issue affects Antideo Email Validator: from n/a through <= 1.0.10. [CVSS 7.5 HIGH]

SQLi
NVD
CVE-2025-67945
EPSS 0% CVSS 9.3
CRITICAL Act Now

MailerLite WordPress plugin has a SQL injection vulnerability enabling attackers to extract sensitive data from the WordPress database.

WordPress SQLi PHP
NVD
CVE-2025-49055
EPSS 0% CVSS 9.8
CRITICAL Act Now

WP Learn SQL Injection allows unauthenticated attackers to execute arbitrary SQL queries against the WordPress database, exposing all stored data.

WordPress SQLi PHP
NVD
CVE-2025-49050
EPSS 0% CVSS 8.8
HIGH This Week

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in kamleshyadav WP Lead Capturing Pages wp-lead-capture allows Blind SQL Injection.This issue affects WP Lead Capturing Pages: from n/a through <= 2.5. [CVSS 8.8 HIGH]

WordPress SQLi PHP
NVD
CVE-2025-49049
EPSS 0% CVSS 8.8
HIGH This Week

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ZoomIt DZS Video Gallery dzs-videogallery allows SQL Injection.This issue affects DZS Video Gallery: from n/a through <= 12.37. [CVSS 8.8 HIGH]

SQLi
NVD
CVE-2025-36588
EPSS 0% CVSS 8.8
HIGH This Week

Dell Unisphere for PowerMax, version(s) 10.2.0.x, contain(s) an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Command execution. [CVSS 8.8 HIGH]

SQLi Unisphere For Powermax Virtual Appliance Unisphere For Powermax
NVD
CVE-2025-4764
EPSS 0% CVSS 8.0
HIGH This Week

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aida Computer Information Technology Inc. Hotel Guest Hotspot allows SQL Injection.This issue affects Hotel Guest Hotspot: through 22012026. [CVSS 8.0 HIGH]

SQLi Hotel Guest Hotspot
NVD
CVE-2026-23959
EPSS 0% CVSS 4.9
MEDIUM PATCH This Month

Improper input sanitization in CoreShop's CustomerTransformerController prior to version 4.1.9 allows authenticated administrators to inject SQL commands through the admin panel, enabling database error-based information disclosure. An attacker with high-privilege access can exploit this to extract sensitive data from the underlying database without modifying or deleting records. A patch is available in version 4.1.9 and later.

SQLi Coreshop
NVD GitHub
CVE-2025-27378
EPSS 0% CVSS 8.6
HIGH This Week

AES contains a SQL injection vulnerability due to an inactive configuration that prevents the latest SQL parsing logic from being applied. When this configuration is not enabled, crafted input may be improperly handled, allowing attackers to inject and execute arbitrary SQL queries. [CVSS 8.6 HIGH]

SQLi On Prem Enterprise Server
NVD
CVE-2021-47872
EPSS 0% CVSS 7.1
HIGH POC This Week

SEO Panel versions prior to 4.9.0 contain a blind SQL injection vulnerability in the archive.php page that allows authenticated attackers to manipulate database queries through the 'order_col' parameter. [CVSS 7.1 HIGH]

PHP SQLi
NVD GitHub Exploit-DB
CVE-2021-47848
EPSS 0% CVSS 8.2
HIGH POC This Week

Blitar Tourism 1.0 contains an authentication bypass vulnerability that allows attackers to bypass login by injecting SQL code through the username parameter. [CVSS 8.2 HIGH]

SQLi Authentication Bypass
NVD GitHub Exploit-DB
CVE-2021-47846
EPSS 0% CVSS 8.2
HIGH POC This Week

Digital Crime Report Management System 1.0 contains a critical SQL injection vulnerability affecting multiple login pages that allows unauthenticated attackers to bypass authentication. [CVSS 8.2 HIGH]

SQLi Authentication Bypass
NVD Exploit-DB
CVE-2025-67261
EPSS 0% CVSS 6.5
MEDIUM This Month

Abacre Retail Point of Sale 14.0.0.396 is vulnerable to content-based blind SQL injection. The vulnerability exists in the Search function of the Orders page. [CVSS 6.5 MEDIUM]

SQLi Retail Point Of Sale
NVD
CVE-2026-1179
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Yonyou KSOA 9.0's /kmf/user_popedom.jsp endpoint allows unauthenticated remote attackers to manipulate the folderid parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite early notification. The attack requires no user interaction and can result in unauthorized data access, modification, or system disruption.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1178
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Yonyou KSOA 9.0 via the folderid parameter in /kmf/select.jsp allows unauthenticated remote attackers to manipulate database queries and potentially extract or modify sensitive data. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite early notification.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1177
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Yonyou KSOA 9.0 via the folderid parameter in /kmf/save_folder.jsp allows unauthenticated remote attackers to manipulate database queries and potentially access, modify, or delete sensitive data. Public exploit code is available for this vulnerability, increasing the risk of active exploitation. No patch is currently available from the vendor.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1176
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in itsourcecode School Management System 1.0 via the ID parameter in /subject/index.php allows unauthenticated remote attackers to query, modify, or delete database contents. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires no user interaction and can be executed over the network against vulnerable instances.

PHP SQLi School Management System
NVD GitHub VulDB
CVE-2026-21696
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Wings for Pterodactyl versions 1.7.0 through 1.11.x fail to respect SQLite's maximum parameter limit when deleting activity log entries, allowing authenticated users to trigger a database error that prevents log cleanup and causes indefinite accumulation of records. This denial of service condition degrades panel performance and availability over time. Public exploit code exists for this vulnerability, and no patch is currently available.

SQLi Wings Suse
NVD GitHub
CVE-2026-23838
EPSS 0%
Monitor

Tandoor Recipes is a recipe manager than can be installed with the Nix package manager. Starting in version 23.05 and prior to version 26.05, when using the default configuration of Tandoor Recipes, specifically using SQLite and default `MEDIA_ROOT`, the full database file may be externally accessible, potentially on the Internet. The root cause is that the NixOS module configures the working directory of Tandoor Recipes, as well as the value of `MEDIA_ROOT`, to be `/var/lib/tandoor-recipes`....

Nginx PostgreSQL SQLi
NVD GitHub
CVE-2026-1160
EPSS 0% CVSS 7.3
HIGH POC This Week

PHPGurukul Directory Management System 1.0 contains a SQL injection vulnerability in the search functionality of /index.php that allows unauthenticated remote attackers to manipulate the searchdata parameter and execute arbitrary database queries. Public exploit code is available for this vulnerability, and no patch is currently available. The vulnerability impacts confidentiality, integrity, and availability with a CVSS score of 7.3.

PHP SQLi Directory Management System
NVD GitHub VulDB
CVE-2026-1159
EPSS 0% CVSS 7.3
HIGH POC This Week

Online Frozen Foods Ordering System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 7.3).

PHP SQLi Online Frozen Foods Ordering System
NVD GitHub VulDB
CVE-2026-0610
EPSS 0% CVSS 9.8
CRITICAL Act Now

Devolutions Server 2025.3.1 through 2025.3.6 contains a SQL injection vulnerability in the remote sessions component that allows attackers to manipulate database queries.

SQLi Devolutions Server
NVD
CVE-2026-1133
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Yonyou KSOA 9.0 allows unauthenticated remote attackers to manipulate the folderid parameter in /kmf/folder.jsp HTTP requests, potentially leading to unauthorized data access or modification. Public exploit code exists for this vulnerability, and the vendor has not provided a patch or response despite early notification.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1132
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Yonyou KSOA 9.0 via the folderid parameter in /kmf/edit_folder.jsp allows unauthenticated remote attackers to execute arbitrary database queries. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite early disclosure notification.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1131
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Yonyou KSOA 9.0's /kmc/save_catalog.jsp endpoint allows unauthenticated remote attackers to manipulate the catalogid parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires only network access with no user interaction, enabling potential data exfiltration and unauthorized database modification.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1130
EPSS 0% CVSS 7.3
HIGH This Week

Unauthenticated SQL injection in Yonyou KSOA 9.0 via the ID parameter in the /worksheet/worksadd_plan.jsp endpoint allows remote attackers to execute arbitrary SQL queries and potentially access or modify sensitive data. Public exploit code exists for this vulnerability, and the vendor has not released a patch despite early notification. The attack requires no authentication or user interaction and can be exploited over the network.

SQLi Ksoa
NVD GitHub VulDB
Prev Page 11 of 51 Next

Quick Facts

Typical Severity
HIGH
Category
web
Total CVEs
4535

Related CWEs

MITRE ATT&CK

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy