Quick.CMS 6.7 contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login authentication by manipulating the login form. Attackers can inject specific SQL payloads like ' or '1'='1 to gain unauthorized administrative access to the system.
References
| Link | Resource |
|---|---|
| https://opensolution.org/download/home.html?sFile=Quick.Cms_v6.7-en.zip | Exploit |
| https://www.exploit-db.com/exploits/51910 | Exploit |
| https://www.opensolution.org | Product |
| https://www.vulncheck.com/advisories/quickcms-sql-injection-authentication-bypass-via-admin-login | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-11 22:15
Updated : 2025-12-31 18:30
NVD link : CVE-2024-58308
Mitre link : CVE-2024-58308
CVE.ORG link : CVE-2024-58308
JSON object : View
Products Affected
opensolution
- quick_cms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
