SQL Command Execution Vulnerability in lmxcms Products
CVE-2024-8523
Key Information:
- Vendor
- lmxcms
- Status
- Lmxcms
- Vendor
- CVE Published:
- 7 September 2024
Badges
Summary
A critical security flaw has been identified in lmxcms versions up to 1.4, specifically within the SQL Command Execution Module. The vulnerability resides in the 'formatData' function located in the '/admin.php?m=Acquisi&a=testcj&lid=1' file. Through improper handling of input parameters, attackers can exploit this weakness to perform code injection attacks, potentially leading to unauthorized access and data manipulation. This issue can be exploited remotely, posing a significant risk to systems using the affected version. Despite early disclosure to the vendor, no response has been recorded, increasing the urgency for users to apply necessary security measures to safeguard their installations.
Affected Version(s)
lmxcms 1.0
lmxcms 1.1
lmxcms 1.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved