A vulnerability was found in Sucms 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/admin_members.php?ac=search. The manipulation of the argument uid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/Upgradeextension/Sucms-v1.0SQLinjection/blob/main/README.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.290786 | Permissions Required VDB Entry |
| https://vuldb.com/?id.290786 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.469566 | Third Party Advisory VDB Entry |
| https://github.com/Upgradeextension/Sucms-v1.0SQLinjection/blob/main/README.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-01-09 00:15
Updated : 2025-06-05 19:45
NVD link : CVE-2024-13194
Mitre link : CVE-2024-13194
CVE.ORG link : CVE-2024-13194
JSON object : View
Products Affected
sucms_project
- sucms
