SQL Injection

web HIGH

SQL injection exploits the way applications construct database queries by mixing user input directly into SQL statements.

How It Works

SQL injection exploits the way applications construct database queries by mixing user input directly into SQL statements. When developers concatenate untrusted data into queries without proper sanitization, attackers can inject SQL syntax that changes the query's logic. For example, entering ' OR '1'='1 into a login form might transform SELECT * FROM users WHERE username='input' into a query that always returns true, bypassing authentication.

Attackers follow a methodical process: first probing input fields with special characters like quotes or semicolons to trigger database errors, then identifying whether the application is vulnerable. Once confirmed, they escalate by injecting commands to extract data (UNION-based attacks to merge results from other tables), manipulate records, or probe the database structure. Blind SQL injection variants work without visible error messages—boolean-based attacks infer data by observing application behavior changes, while time-based attacks use database sleep functions to confirm successful injection through response delays.

Advanced scenarios include second-order injection, where malicious input is stored in the database and later executed in a different context, and out-of-band attacks that exfiltrate data through DNS queries or HTTP requests when direct data retrieval isn't possible. Some database systems enable attackers to execute operating system commands through built-in functions like MySQL's LOAD_FILE or SQL Server's xp_cmdshell, escalating from database compromise to full server control.

Impact

  • Complete data breach — extraction of entire database contents including credentials, personal information, and proprietary data
  • Authentication bypass — logging in as any user without knowing passwords
  • Data manipulation — unauthorized modification or deletion of critical records
  • Privilege escalation — granting administrative rights to attacker-controlled accounts
  • Remote code execution — leveraging database features to run operating system commands and compromise the underlying server
  • Lateral movement — using compromised database credentials to access other connected systems

Real-World Examples

FreePBX's CVE-2025-66039 demonstrated a complete attack chain where SQL injection across 11 parameters in four different endpoints allowed attackers to write malicious entries into the cron_jobs table. When the system's scheduler executed these entries, the injected SQL transformed into operating system commands, granting full server control. The vulnerability required no authentication, making it immediately exploitable.

E-commerce platforms have suffered massive breaches through shopping cart SQL injection, where attackers inserted skimming code into stored procedures that executed during checkout, harvesting credit card data from thousands of transactions. Healthcare systems have been compromised through patient portal vulnerabilities, exposing millions of medical records when attackers injected UNION queries to merge data from supposedly isolated tables.

Mitigation

  • Parameterized queries (prepared statements) — separates SQL logic from data, making injection syntactically impossible
  • Object-Relational Mapping (ORM) frameworks — abstracts database interactions with built-in protections when used correctly
  • Strict input validation — whitelist acceptable characters and formats, reject suspicious patterns
  • Least privilege database accounts — applications should use credentials with minimal necessary permissions
  • Web Application Firewall (WAF) — detects and blocks common injection patterns as a secondary defense layer
  • Database activity monitoring — alerts on unusual query patterns or privilege escalation attempts

Recent CVEs (4539)

CVE-2026-1133
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Yonyou KSOA 9.0 allows unauthenticated remote attackers to manipulate the folderid parameter in /kmf/folder.jsp HTTP requests, potentially leading to unauthorized data access or modification. Public exploit code exists for this vulnerability, and the vendor has not provided a patch or response despite early notification.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1132
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Yonyou KSOA 9.0 via the folderid parameter in /kmf/edit_folder.jsp allows unauthenticated remote attackers to execute arbitrary database queries. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite early disclosure notification.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1131
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Yonyou KSOA 9.0's /kmc/save_catalog.jsp endpoint allows unauthenticated remote attackers to manipulate the catalogid parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires only network access with no user interaction, enabling potential data exfiltration and unauthorized database modification.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1130
EPSS 0% CVSS 7.3
HIGH This Week

Unauthenticated SQL injection in Yonyou KSOA 9.0 via the ID parameter in the /worksheet/worksadd_plan.jsp endpoint allows remote attackers to execute arbitrary SQL queries and potentially access or modify sensitive data. Public exploit code exists for this vulnerability, and the vendor has not released a patch despite early notification. The attack requires no authentication or user interaction and can be exploited over the network.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1129
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Yonyou KSOA 9.0's /worksheet/worksadd.jsp endpoint allows unauthenticated remote attackers to manipulate the ID parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and no patch is currently available from the vendor despite early notification. The attack requires no user interaction and could enable unauthorized data access, modification, or deletion.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1124
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Yonyou KSOA 9.0 allows unauthenticated remote attackers to manipulate the ID parameter in the /worksheet/work_report.jsp endpoint, potentially enabling unauthorized data access or modification. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite early notification.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1123
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Yonyou KSOA 9.0's /worksheet/work_mod.jsp endpoint allows unauthenticated remote attackers to manipulate the ID parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and the vendor has not provided a patch or response to disclosure. The attack requires no user interaction and could enable unauthorized data access or modification.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1122
EPSS 0% CVSS 7.3
HIGH This Week

Yonyou KSOA 9.0 contains a SQL injection vulnerability in the /worksheet/work_info.jsp endpoint via an unsanitized ID parameter, allowing unauthenticated remote attackers to execute arbitrary SQL queries. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite early notification. The attack requires no user interaction and can result in unauthorized data access, modification, or denial of service.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1121
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Yonyou KSOA 9.0's /worksheet/del_workplan.jsp endpoint allows unauthenticated remote attackers to manipulate the ID parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and no patch is currently available from the vendor despite early disclosure notification.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1120
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in Yonyou KSOA 9.0 allows unauthenticated remote attackers to manipulate the ID parameter in the /worksheet/del_work.jsp endpoint, potentially enabling unauthorized data access, modification, or deletion. Public exploit code exists for this vulnerability, and no patch is currently available from the vendor despite early disclosure notification.

SQLi Ksoa
NVD GitHub VulDB
CVE-2026-1119
EPSS 0% CVSS 7.3
HIGH POC This Week

Society Management System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 7.3).

PHP SQLi Society Management System
NVD GitHub VulDB
CVE-2026-1118
EPSS 0% CVSS 6.3
MEDIUM POC This Month

SQL injection in itsourcecode Society Management System 1.0 allows authenticated attackers to manipulate the Title parameter in /admin/add_activity.php, enabling remote data exfiltration, modification, or denial of service. Public exploit code exists for this vulnerability, and no patch is currently available.

PHP SQLi Society Management System
NVD GitHub VulDB
CVE-2026-1105
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in EasyCMS up to version 1.6 via the _order parameter in /UserAction.class.php allows unauthenticated remote attackers to manipulate database queries and potentially access or modify sensitive data. Public exploit code exists for this vulnerability, and no patch is currently available from the vendor despite early notification.

PHP SQLi Easycms
NVD GitHub VulDB
CVE-2026-1059
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in FeMiner Warehouse Management System's /src/chkuser.php endpoint allows unauthenticated remote attackers to manipulate the Username parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and the vendor has not provided patches despite early notification. The flaw affects all versions up to commit 9cad1f1b179a98b9547fd003c23b07c7594775fa and enables attackers to potentially read, modify, or delete sensitive warehouse data.

PHP SQLi Warehouse Management System
NVD GitHub VulDB
CVE-2026-1050
EPSS 0% CVSS 7.3
HIGH This Week

SQL injection in the REST authentication endpoint of risesoft-y9 Digital-Infrastructure up to version 9.6.7 allows unauthenticated remote attackers to manipulate input parameters and execute arbitrary SQL queries. Public exploit code exists for this vulnerability, and the vendor has not yet released a patch despite early notification. The attack requires no user interaction and can compromise data confidentiality, integrity, and availability.

Java SQLi
NVD GitHub VulDB
CVE-2025-12984
EPSS 0% CVSS 4.9
MEDIUM This Month

The Advanced Ads - Ad Manager & AdSense plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter in all versions up to, and including, 2.0.15 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. [CVSS 4.9 MEDIUM]

WordPress SQLi PHP
NVD
CVE-2026-23723
EPSS 0% CVSS 7.2
HIGH POC PATCH This Week

SQL injection in WeGIA's Atendido_ocorrenciaControle endpoint allows authenticated attackers to manipulate the id_memorando parameter and extract entire databases, exposing sensitive personal information and potentially reading arbitrary files on misconfigured systems. Public exploit code exists for this vulnerability affecting WeGIA versions prior to 3.6.2. A patch is available in version 3.6.2 and should be deployed immediately to affected charitable institution management systems.

SQLi Wegia
NVD GitHub
CVE-2021-47811
EPSS 0% CVSS 9.1
CRITICAL POC Act Now

Grocery Crud 1.6.4 has a SQL injection vulnerability in the order_by parameter, allowing remote attackers to read, modify, or delete database contents through crafted sort requests.

SQLi Grocery Crud
NVD Exploit-DB
CVE-2021-47801
EPSS 0% CVSS 8.2
HIGH POC This Week

Vianeos OctoPUS 5 contains a time-based blind SQL injection vulnerability in the 'login_user' parameter during authentication requests. [CVSS 8.2 HIGH]

SQLi
NVD Exploit-DB
CVE-2021-47782
EPSS 0% CVSS 8.2
HIGH POC This Week

Odine Solutions GateKeeper 1.0 contains a SQL injection vulnerability in the trafficCycle API endpoint that allows remote attackers to inject malicious database queries. [CVSS 8.2 HIGH]

PostgreSQL SQLi
NVD Exploit-DB
CVE-2025-70893
EPSS 0% CVSS 8.8
HIGH POC This Week

A time-based blind SQL Injection vulnerability exists in PHPGurukul Cyber Cafe Management System v1.0 within the adminprofile.php endpoint. [CVSS 8.8 HIGH]

PHP SQLi Cyber Cafe Management System
NVD GitHub
CVE-2025-70892
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Phpgurukul Cyber Cafe Management System v1.0 has SQL injection in the username parameter of add-users.php. PoC available.

PHP SQLi Cyber Cafe Management System
NVD GitHub
CVE-2025-66417
EPSS 0% CVSS 7.5
HIGH This Week

GLPI is a free asset and IT management software package. From 11.0.0, < 11.0.3, an unauthenticated user can perform a SQL injection through the inventory endpoint. [CVSS 7.5 HIGH]

SQLi Glpi
NVD GitHub
CVE-2021-47777
EPSS 0% CVSS 8.2
HIGH POC This Week

Build Smart ERP 21.0817 contains an unauthenticated SQL injection vulnerability in the 'eidValue' parameter of the login validation endpoint. [CVSS 8.2 HIGH]

SQLi
NVD Exploit-DB
CVE-2021-47766
EPSS 0% CVSS 7.1
HIGH POC This Week

Kmaleon 1.1.0.205 contains an authenticated SQL injection vulnerability in the 'tipocomb' parameter of kmaleonW.php that allows attackers to manipulate database queries. [CVSS 7.1 HIGH]

PHP SQLi
NVD Exploit-DB
CVE-2021-47763
EPSS 0% CVSS 8.2
HIGH POC This Week

Aimeos 2021.10 LTS contains a SQL injection vulnerability in the json api 'sort' parameter that allows attackers to inject malicious database queries. Attackers can manipulate the sort parameter to reveal table and column names by sending crafted GET requests to the jsonapi/review endpoint. [CVSS 8.2 HIGH]

SQLi
NVD Exploit-DB
CVE-2025-67082
EPSS 0% CVSS 6.5
MEDIUM POC This Month

An SQL injection vulnerability in InvoicePlane through 1.6.3 has been identified in "maxQuantity" and "minQuantity" parameters when generating a report. An authenticated attacker can exploit this issue via error-based SQL injection, allowing for the extraction of arbitrary data from the database. [CVSS 6.5 MEDIUM]

SQLi Invoiceplane
NVD GitHub
CVE-2025-67081
EPSS 0% CVSS 4.9
MEDIUM This Month

An SQL injection vulnerability in Itflow through 25.06 has been identified in the "role_id" parameter when editing a profile. An attacker with admin account can exploit this issue via blind SQL injection, allowing for the extraction of arbitrary data from the database. [CVSS 4.9 MEDIUM]

SQLi Itflow
NVD GitHub
CVE-2025-12166
EPSS 0% CVSS 7.5
HIGH This Week

The Appointment Booking Calendar - Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection via the `order` and `append_where_sql` parameters in all versions up to, and including, 1.6.9.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. [CVSS 7.5 HIGH]

WordPress SQLi PHP
NVD
CVE-2026-23492
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Blind SQL injection in Pimcore's Admin Search Find API allows authenticated attackers to extract database information through inferential techniques, bypassing the incomplete mitigation from a prior patch that only removed comment-based attacks. The vulnerability affects Pimcore versions prior to 12.3.1 and 11.5.14, with public exploit code available. Patched versions are available and should be deployed immediately.

SQLi Information Disclosure Pimcore
NVD GitHub
CVE-2025-37183
EPSS 0% CVSS 7.2
HIGH This Week

Vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to perform SQL injection attacks. [CVSS 7.2 HIGH]

SQLi Edgeconnect Sd Wan Orchestrator
NVD
CVE-2025-37182
EPSS 0% CVSS 7.2
HIGH This Week

Vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to perform SQL injection attacks. [CVSS 7.2 HIGH]

SQLi Edgeconnect Sd Wan Orchestrator
NVD
CVE-2025-37181
EPSS 0% CVSS 7.2
HIGH This Week

Vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to perform SQL injection attacks. [CVSS 7.2 HIGH]

SQLi Edgeconnect Sd Wan Orchestrator
NVD
CVE-2025-14770
EPSS 0% CVSS 7.5
HIGH This Week

The Shipping Rate By Cities plugin for WordPress is vulnerable to SQL Injection via the 'city' parameter in all versions up to, and including, 2.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. [CVSS 7.5 HIGH]

WordPress SQLi PHP
NVD
CVE-2026-0678
EPSS 0% CVSS 4.9
MEDIUM This Month

Flat Shipping Rate by City for WooCommerce (WordPress plugin) is affected by sql injection (CVSS 4.9).

WordPress SQLi
NVD
CVE-2025-14615
EPSS 0% CVSS 7.1
HIGH This Week

The DASHBOARD BUILDER - WordPress plugin for Charts and Graphs plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.7. This is due to missing nonce validation on the settings handler in dashboardbuilder-admin.php. [CVSS 7.1 HIGH]

WordPress PHP SQLi +1
NVD
CVE-2023-54340
EPSS 0% CVSS 8.2
HIGH POC This Week

WorkOrder CMS 0.1.0 contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login by manipulating username and password parameters. [CVSS 8.2 HIGH]

SQLi
NVD GitHub Exploit-DB
CVE-2023-54333
EPSS 0% CVSS 8.2
HIGH POC This Week

Social-Share-Buttons 2.2.3 contains a critical SQL injection vulnerability in the project_id parameter that allows attackers to manipulate database queries. [CVSS 8.2 HIGH]

SQLi
NVD GitHub Exploit-DB
CVE-2022-50895
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Aero CMS 0.0.1 has SQL injection in the author parameter exploitable through boolean-based, error-based, time-based, and UNION query techniques. PoC available.

SQLi Aerocms
NVD GitHub Exploit-DB
CVE-2022-50894
EPSS 0% CVSS 6.5
MEDIUM POC This Month

VIAVIWEB Wallpaper Admin 1.0 contains an SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the img_id parameter. [CVSS 6.5 MEDIUM]

PHP SQLi Wallpaper Admin
NVD Exploit-DB
CVE-2022-50892
EPSS 0% CVSS 8.2
HIGH POC This Week

VIAVIWEB Wallpaper Admin 1.0 contains a SQL injection vulnerability that allows attackers to bypass authentication by manipulating login credentials. Attackers can exploit the login page by injecting 'admin' or 1=1-- - payload to gain unauthorized access to the administrative interface. [CVSS 8.2 HIGH]

SQLi Authentication Bypass Wallpaper Admin
NVD Exploit-DB
CVE-2022-50805
EPSS 0% CVSS 8.2
HIGH POC This Week

Senayan Library Management System 9.0.0 contains a SQL injection vulnerability in the 'class' parameter that allows attackers to inject malicious SQL queries. [CVSS 8.2 HIGH]

SQLi
NVD GitHub Exploit-DB
CVE-2026-20947
EPSS 0% CVSS 8.8
HIGH This Week

SQL injection in Microsoft SharePoint Server enables authenticated attackers to execute arbitrary code remotely through improper sanitization of database queries. This vulnerability affects authorized users with network access and could allow them to compromise affected systems with high-level privileges. No patch is currently available for this issue.

Microsoft SQLi Sharepoint Server
NVD
CVE-2025-59922
EPSS 0% CVSS 7.2
HIGH This Week

An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] vulnerability in Fortinet FortiClientEMS 7.4.3 through 7.4.4, FortiClientEMS 7.4.0 through 7.4.1, FortiClientEMS 7.2.0 through 7.2.10, FortiClientEMS 7.0 all versions may allow an authenticated attacker with at least read-only admin permission to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests. [CVSS 7.2 HIGH]

Fortinet SQLi Forticlientems
NVD
CVE-2025-69991
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

phpgurukul News Portal V4.1 has SQL injection in check_availablity.php. PoC available.

PHP SQLi News Portal
NVD GitHub
CVE-2025-13774
EPSS 0% CVSS 8.8
HIGH This Week

A vulnerability exists in Progress Flowmon ADS versions prior to 12.5.4 and 13.0.1 where an SQL injection vulnerability allows authenticated users to execute unintended SQL queries and commands. [CVSS 8.8 HIGH]

SQLi Flowmon Anomaly Detection System
NVD
CVE-2025-67146
EPSS 0% CVSS 9.4
CRITICAL POC Act Now

GYM-MANAGEMENT-SYSTEM 1.0 has multiple SQL injection vulnerabilities in search and payment endpoints (member_search, trainer_search, gym_search, payment_search). PoC available.

PHP SQLi Authentication Bypass +1
NVD GitHub
CVE-2025-67147
EPSS 0% CVSS 9.8
CRITICAL Act Now

Gym Management System PHP 1.0 has multiple SQL injection vulnerabilities across three files (submit_contact.php, secure_login.php, change_s_pwd.php) through seven parameters. Authentication bypass and data extraction possible.

PHP SQLi Authentication Bypass
NVD GitHub
CVE-2025-51567
EPSS 0% CVSS 9.1
CRITICAL POC Act Now

Kashipara Online Exam System V1.0 has SQL injection in profile.php through five POST parameters (rname, rcollage, rnumber, rgender, rpassword). PoC available.

PHP SQLi Online Exam System
NVD GitHub
CVE-2025-41006
EPSS 0%
This Week

Imaster's MEMS Events CRM contains an SQL injection vulnerability in ‘phone’ parameter in ‘/memsdemo/login.php’.

PHP SQLi
NVD
CVE-2025-41005
EPSS 0%
This Week

Imaster's MEMS Events CRM contains an SQL injection vulnerability in‘keyword’ parameter in ‘/memsdemo/exchange_offers.php’.

PHP SQLi
NVD
CVE-2025-41004
EPSS 0%
This Week

Imaster's Patient Records Management System is vulnerable to SQL Injection in the endpoint ‘/projects/hospital/admin/complaints.php’ through the ‘id’ parameter.

PHP SQLi
NVD
CVE-2025-52694
EPSS 13% CVSS 10.0
CRITICAL Act Now

Critical SQL injection vulnerability in an internet-exposed service enabling unauthenticated extraction and manipulation of the entire database. CVSS 10.0 with scope change, EPSS 12.9% indicating high exploitation activity.

SQLi Iotsuite Starter Linux Docker Iot Edge Windows +3
NVD
CVE-2026-0852
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in Online Music Site 1.0's AdminUpdateUser.php allows unauthenticated remote attackers to manipulate the ID parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and no patch is currently available. Successful exploitation could enable unauthorized data access, modification, or deletion with confidentiality, integrity, and availability impact.

PHP SQLi Online Music Site
NVD GitHub VulDB
CVE-2026-0851
EPSS 0% CVSS 7.3
HIGH POC This Week

SQL injection in code-projects Online Music Site 1.0 via the txtusername parameter in AdminAddUser.php enables unauthenticated remote attackers to manipulate database queries and potentially access or modify sensitive data. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. No patch is currently available.

PHP SQLi Online Music Site
NVD GitHub VulDB
CVE-2026-0850
EPSS 0% CVSS 4.7
MEDIUM POC This Month

Intern Membership Management System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 4.7).

PHP SQLi Intern Membership Management System
NVD GitHub VulDB
CVE-2026-0843
EPSS 0% CVSS 6.3
MEDIUM This Month

SQL injection in jjjfood and jjjshop_food PHP applications through the latitude parameter in /index.php/api/product.category/index allows authenticated attackers to execute arbitrary database queries remotely. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite notification. Affected installations up to version 20260103 should implement immediate mitigation measures.

PHP SQLi
NVD VulDB
CVE-2026-22687
EPSS 0% CVSS 5.6
MEDIUM POC PATCH This Month

WeKnora versions before 0.2.5 allow unauthenticated attackers to bypass database query restrictions through prompt injection techniques when the Agent service is enabled, enabling unauthorized access to sensitive data. Public exploit code exists for this vulnerability, which affects the framework's document understanding and semantic retrieval capabilities. A patch is available in version 0.2.5 and later.

SQLi AI / ML Weknora +1
NVD GitHub
CVE-2025-65091
EPSS 0% CVSS 10.0
CRITICAL PATCH Act Now

XWiki Full Calendar Macro (before 2.4.5) has SQL injection accessible to guest users via the Calendar.JSONService page. Maximum CVSS 10.0 with scope change. Patch available.

SQLi Denial Of Service Full Calendar Macro
NVD GitHub
CVE-2025-51626
EPSS 0% CVSS 6.5
MEDIUM This Month

SQL injection vulnerability in pss.sale.com 1.0 via the id parameter to the userfiles/php/cancel_order.php endpoint. [CVSS 6.5 MEDIUM]

PHP SQLi Pss.Sale.Com
NVD GitHub
CVE-2025-67811
EPSS 0% CVSS 6.5
MEDIUM This Month

Area9 Rhapsode 1.47.3 allows SQL Injection via multiple API endpoints accessible to authenticated users. Insufficient input validation allows remote attackers to inject arbitrary SQL commands, resulting in unauthorized database access and potential compromise of sensitive data. [CVSS 6.5 MEDIUM]

SQLi Rhapsode
NVD
CVE-2026-22197
EPSS 0% CVSS 8.1
HIGH This Week

GestSup versions before 3.2.60 allow authenticated attackers to execute SQL injection attacks through insufficiently sanitized filtering and sorting parameters in the asset list functionality, potentially enabling unauthorized database access or modification. The vulnerability requires valid credentials to exploit but has no available patch, leaving affected installations vulnerable to data breach or manipulation depending on database permissions.

SQLi Gestsup
NVD
CVE-2026-22196
EPSS 0% CVSS 8.1
HIGH This Week

GestSup prior to version 3.2.60 is vulnerable to SQL injection in the ticket creation feature, allowing authenticated attackers to execute arbitrary database queries through unsanitized user input. An attacker with valid credentials can read or modify sensitive database contents depending on the database permission level. No patch is currently available.

SQLi Gestsup
NVD
CVE-2026-22195
EPSS 0% CVSS 8.1
HIGH This Week

Authenticated attackers can exploit SQL injection in GestSup's search functionality (versions before 3.2.60) to manipulate database queries and access or modify sensitive data. The vulnerability stems from insufficient input validation on user-controlled search parameters in SQL statements. With no patch currently available, affected organizations should implement database access controls and monitor for suspicious search activity.

SQLi Gestsup
NVD
CVE-2025-15496
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A vulnerability was determined in guchengwuyue yshopmall up to 1.9.1. Affected is the function getPage of the file /api/jobs. [CVSS 6.3 MEDIUM]

SQLi Yshopmall
NVD GitHub VulDB
CVE-2025-15494
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A vulnerability has been found in RainyGao DocSys up to 2.02.37. This affects an unknown function of the file com/DocSystem/mapping/UserMapper.xml. [CVSS 6.3 MEDIUM]

SQLi Docsys
NVD GitHub VulDB
CVE-2025-15493
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Docsys versions up to 2.02.36. contains a vulnerability that allows attackers to sql injection (CVSS 6.3).

SQLi Docsys
NVD GitHub VulDB
CVE-2026-0803
EPSS 0% CVSS 6.3
MEDIUM POC This Month

PHPGurukul Online Course Registration System through version 3.1 contains a SQL injection vulnerability in /enroll.php that allows authenticated attackers to manipulate multiple parameters (studentregno, Pincode, session, department, level, course, sem) to execute arbitrary database queries over the network. Public exploit code exists for this vulnerability, and no patch is currently available, creating risk for deployments handling course enrollment data.

PHP SQLi Online Course Registration System
NVD VulDB
CVE-2025-67281
EPSS 0% CVSS 5.4
MEDIUM This Month

In TIM BPM Suite/ TIM FLOW through 9.1.2 multiple SQL injection vulnerabilities exists which allow a low privileged and administrative user to access the database and its content. [CVSS 5.4 MEDIUM]

SQLi Tim Flow
NVD
CVE-2025-67280
EPSS 0% CVSS 5.4
MEDIUM This Month

In TIM BPM Suite/ TIM FLOW through 9.1.2 multiple Hibernate Query Language injection vulnerabilities exist which allow a low privileged user to extract passwords of other users and access sensitive data of another user. [CVSS 5.4 MEDIUM]

Information Disclosure SQLi Tim Flow
NVD
CVE-2025-15492
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A vulnerability was detected in RainyGao DocSys up to 2.02.36. The affected element is an unknown function of the file src/com/DocSystem/mapping/GroupMemberMapper.xml. [CVSS 6.3 MEDIUM]

SQLi Docsys
NVD GitHub VulDB
CVE-2025-14598
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

BeeS Software BET Portal has SQL injection in the login functionality, allowing unauthenticated attackers to bypass authentication and extract database contents. PoC available.

SQLi Bet E Portal
NVD GitHub
CVE-2025-64092
EPSS 0% CVSS 7.5
HIGH This Week

This vulnerability allows unauthenticated attackers to inject an SQL request into GET request parameters and directly query the underlying database. [CVSS 7.5 HIGH]

SQLi Icx500 Firmware Icx510 Firmware
NVD
CVE-2026-0733
EPSS 0% CVSS 6.3
MEDIUM POC This Month

SQL injection in PHPGurukul Online Course Registration System through 3.1 allows authenticated attackers to manipulate the id/cid parameters in the manage-students.php admin function, enabling unauthorized database access and potential data modification. Public exploit code exists for this vulnerability, and no patch is currently available.

PHP SQLi Online Course Registration System
NVD VulDB
CVE-2026-0729
EPSS 0% CVSS 4.7
MEDIUM POC This Month

SQL injection in the Intern Membership Management System 1.0 add_activity.php file allows authenticated administrators to manipulate the Title parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and no patch is currently available. The flaw enables an authenticated attacker with high privileges to compromise data confidentiality and integrity.

PHP SQLi Intern Membership Management System
NVD GitHub VulDB
CVE-2026-0728
EPSS 0% CVSS 4.7
MEDIUM POC This Month

SQL injection in the Intern Membership Management System 1.0 admin deletion function allows authenticated attackers with high privileges to manipulate the admin_id parameter and execute arbitrary database queries remotely. Public exploit code is available for this vulnerability, which affects PHP-based deployments. The vulnerability enables unauthorized data access, modification, and potential denial of service with no patch currently available.

PHP SQLi Intern Membership Management System
NVD GitHub VulDB
CVE-2025-61548
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Print Shop Pro WebDesk 18.34 has SQL injection in the hfInventoryDistFormID parameter of GetUnitPrice. Combined with CVE-2025-61546 (negative quantities), this endpoint has two critical vulnerabilities. PoC available, fixed in 19.69.

SQLi Print Shop Pro Webdesk
NVD GitHub
CVE-2025-61246
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

online-shopping-system-php 1.0 has SQL injection in review_action.php via the proId parameter. PoC available.

PHP SQLi Online Shopping System
NVD GitHub
CVE-2026-21892
EPSS 0% CVSS 5.3
MEDIUM POC PATCH This Month

SQL injection in Parsl's visualization dashboard allows unauthenticated attackers to execute arbitrary database queries through unsafe string formatting of the workflow_id parameter. Public exploit code exists for this vulnerability, enabling potential data theft or database denial of service attacks against the monitoring infrastructure. The issue affects Parsl versions prior to 2026.01.05, which includes the fix.

Python SQLi Denial Of Service +1
NVD GitHub
CVE-2026-22242
EPSS 0% CVSS 4.9
MEDIUM POC PATCH This Month

Blind SQL injection in CoreShop prior to version 4.1.8 allows authenticated administrators to extract sensitive database information through boolean-based or time-based attack techniques. The vulnerability is limited to information disclosure due to the application's read-only database permissions, preventing data modification or denial of service. Public exploit code exists for this vulnerability; administrators should upgrade to version 4.1.8 or later.

SQLi Coreshop
NVD GitHub
CVE-2025-67928
EPSS 0% CVSS 9.8
CRITICAL Act Now

Automotive Listings WordPress theme (through 18.6) has blind SQL injection enabling unauthenticated database extraction.

SQLi
NVD
CVE-2025-67921
EPSS 0% CVSS 9.8
CRITICAL Act Now

Lobo WordPress theme (before 2.8.6) has blind SQL injection enabling unauthenticated database extraction.

SQLi
NVD
CVE-2025-23993
EPSS 0% CVSS 9.8
CRITICAL Act Now

Felan Framework (through 1.1.3) also has SQL injection in addition to the auth bypass (CVE-2025-23504). Two critical vulnerabilities in the same plugin create a devastating attack chain.

SQLi
NVD
CVE-2025-22728
EPSS 0% CVSS 9.8
CRITICAL Act Now

Workreap WordPress plugin (through 3.3.6) has SQL injection enabling unauthenticated database extraction. A freelance marketplace plugin likely containing user PII and financial data.

SQLi
NVD
CVE-2025-22713
EPSS 0% CVSS 9.8
CRITICAL Act Now

WooCommerce Orders & Customers Exporter (through 5.4) has SQL injection enabling unauthenticated extraction of all order and customer data including payment details and personal information.

WordPress SQLi PHP
NVD
CVE-2026-0701
EPSS 0% CVSS 4.7
MEDIUM POC This Month

SQL injection in the admin panel of code-projects Intern Membership Management System 1.0 allows authenticated attackers with high privileges to manipulate the Username parameter in /intern/admin/add_admin.php and execute arbitrary database queries. Public exploit code exists for this vulnerability, and no patch is currently available. Affected organizations should restrict administrative access and consider implementing input validation controls or upgrading to a patched version when available.

PHP SQLi Intern Membership Management System
NVD GitHub VulDB
CVE-2026-0700
EPSS 0% CVSS 7.3
HIGH POC This Week

Intern Membership Management System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 7.3).

PHP SQLi Intern Membership Management System
NVD GitHub VulDB
CVE-2026-0699
EPSS 0% CVSS 4.7
MEDIUM POC This Month

SQL injection in the Intern Membership Management System 1.0 admin panel allows authenticated attackers with high privileges to manipulate the activity_id parameter in edit_activity.php, potentially leading to unauthorized data access, modification, or deletion. Public exploit code exists for this vulnerability, though no patch is currently available.

PHP SQLi Intern Membership Management System
NVD GitHub VulDB
CVE-2026-0698
EPSS 0% CVSS 4.7
MEDIUM POC This Month

SQL injection in the Intern Membership Management System 1.0 admin panel allows authenticated attackers with high privileges to manipulate the admin_id parameter in /intern/admin/edit_students.php and execute arbitrary database queries. Public exploit code exists for this vulnerability, enabling attackers to read, modify, or delete sensitive data. No patch is currently available to remediate this issue.

PHP SQLi Intern Membership Management System
NVD GitHub VulDB
CVE-2026-0697
EPSS 0% CVSS 4.7
MEDIUM POC This Month

SQL injection in the Intern Membership Management System 1.0 admin panel allows remote attackers with high privileges to manipulate the admin_id parameter in /intern/admin/edit_admin.php, potentially enabling unauthorized data access or modification. Public exploit code exists for this vulnerability, and no patch is currently available.

PHP SQLi Intern Membership Management System
NVD GitHub VulDB
Prev Page 12 of 51 Next

Quick Facts

Typical Severity
HIGH
Category
web
Total CVEs
4539

Related CWEs

MITRE ATT&CK

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy