CVE-2026-1059: SQL Injection in FeMiner wms
A security vulnerability has been detected in FeMiner wms up to 9cad1f1b179a98b9547fd003c23b07c7594775fa. Affected by this vulnerability is an unknown functionality of the file /src/chkuser.php. The manipulation of the argument Username leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-1059 identifies a SQL injection vulnerability in FeMiner wms, an application used for warehouse management. The vulnerability resides in the /src/chkuser.php file, where the Username parameter is improperly sanitized, allowing an attacker to inject malicious SQL queries. This injection flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The product uses a rolling release strategy, complicating exact version identification, but all versions up to the specified commit hash are affected. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with network attack vector, low complexity, and no privileges or user interaction required. The impact includes potential unauthorized data access, modification, or deletion, which could compromise system integrity and availability. The vendor was notified but has not issued a patch or response, and no known exploits are currently active in the wild, though public exploit code exists. This vulnerability poses a significant risk to organizations relying on FeMiner wms for critical warehouse management operations, especially where sensitive or regulated data is stored.
Potential Impact
The SQL injection vulnerability in FeMiner wms can lead to unauthorized access to sensitive data, including user credentials and operational information, potentially resulting in data breaches. Attackers could manipulate database queries to alter or delete data, disrupting warehouse management processes and causing operational downtime. The integrity of business-critical data could be compromised, leading to incorrect inventory records or shipment errors. Availability may also be affected if attackers execute denial-of-service conditions through crafted SQL payloads. Given the remote, unauthenticated nature of the exploit, the threat surface is broad, increasing the likelihood of exploitation. Organizations in logistics, manufacturing, and retail sectors using FeMiner wms could face financial losses, reputational damage, and regulatory penalties if exploited. The lack of vendor response and patches exacerbates the risk, leaving systems exposed until mitigations are applied.
Mitigation Recommendations
Organizations should immediately audit their use of FeMiner wms and identify instances running affected versions. As no official patches are available, implement web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the Username parameter in /src/chkuser.php. Employ input validation and parameterized queries at the application level if source code access is possible to sanitize user inputs. Monitor logs for suspicious database query patterns and failed login attempts indicative of injection attempts. Restrict network access to the wms application to trusted IP ranges and enforce strict access controls. Conduct regular security assessments and penetration tests focusing on injection flaws. Prepare incident response plans for potential data breaches or service disruptions. Engage with the vendor for updates and consider alternative solutions if remediation is delayed. Finally, keep backups of critical data to enable recovery in case of data corruption or loss.
Affected Countries
United States, Germany, China, Japan, South Korea, United Kingdom, France, Canada, Netherlands, Australia
CVE-2026-1059: SQL Injection in FeMiner wms
Description
A security vulnerability has been detected in FeMiner wms up to 9cad1f1b179a98b9547fd003c23b07c7594775fa. Affected by this vulnerability is an unknown functionality of the file /src/chkuser.php. The manipulation of the argument Username leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1059 identifies a SQL injection vulnerability in FeMiner wms, an application used for warehouse management. The vulnerability resides in the /src/chkuser.php file, where the Username parameter is improperly sanitized, allowing an attacker to inject malicious SQL queries. This injection flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The product uses a rolling release strategy, complicating exact version identification, but all versions up to the specified commit hash are affected. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with network attack vector, low complexity, and no privileges or user interaction required. The impact includes potential unauthorized data access, modification, or deletion, which could compromise system integrity and availability. The vendor was notified but has not issued a patch or response, and no known exploits are currently active in the wild, though public exploit code exists. This vulnerability poses a significant risk to organizations relying on FeMiner wms for critical warehouse management operations, especially where sensitive or regulated data is stored.
Potential Impact
The SQL injection vulnerability in FeMiner wms can lead to unauthorized access to sensitive data, including user credentials and operational information, potentially resulting in data breaches. Attackers could manipulate database queries to alter or delete data, disrupting warehouse management processes and causing operational downtime. The integrity of business-critical data could be compromised, leading to incorrect inventory records or shipment errors. Availability may also be affected if attackers execute denial-of-service conditions through crafted SQL payloads. Given the remote, unauthenticated nature of the exploit, the threat surface is broad, increasing the likelihood of exploitation. Organizations in logistics, manufacturing, and retail sectors using FeMiner wms could face financial losses, reputational damage, and regulatory penalties if exploited. The lack of vendor response and patches exacerbates the risk, leaving systems exposed until mitigations are applied.
Mitigation Recommendations
Organizations should immediately audit their use of FeMiner wms and identify instances running affected versions. As no official patches are available, implement web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the Username parameter in /src/chkuser.php. Employ input validation and parameterized queries at the application level if source code access is possible to sanitize user inputs. Monitor logs for suspicious database query patterns and failed login attempts indicative of injection attempts. Restrict network access to the wms application to trusted IP ranges and enforce strict access controls. Conduct regular security assessments and penetration tests focusing on injection flaws. Prepare incident response plans for potential data breaches or service disruptions. Engage with the vendor for updates and consider alternative solutions if remediation is delayed. Finally, keep backups of critical data to enable recovery in case of data corruption or loss.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-16T19:04:21.251Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696c87f2d302b072d9a7fc74
Added to database: 1/18/2026, 7:12:50 AM
Last enriched: 2/23/2026, 10:47:27 PM
Last updated: 3/25/2026, 8:07:55 AM
Views: 186
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.