Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1105: SQL Injection in EasyCMS

0
Medium
VulnerabilityCVE-2026-1105cvecve-2026-1105
Published: Sat Jan 17 2026 (01/17/2026, 23:32:05 UTC)
Source: CVE Database V5
Product: EasyCMS

Description

A vulnerability was identified in EasyCMS up to 1.6. This vulnerability affects unknown code of the file /UserAction.class.php. Such manipulation of the argument _order leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/25/2026, 19:46:16 UTC

Technical Analysis

CVE-2026-1105 is a remote SQL injection vulnerability identified in EasyCMS versions 1.0 through 1.6, specifically in the /UserAction.class.php file. The vulnerability arises from improper sanitization of the _order argument, which attackers can manipulate to inject arbitrary SQL commands. This injection flaw allows unauthenticated attackers to execute SQL queries remotely, potentially leading to unauthorized data access, data modification, or denial of service. The vulnerability does not require any user interaction or privileges, making exploitation straightforward. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the network attack vector, low complexity, and no required authentication, but limited impact on confidentiality, integrity, and availability. Although no known active exploitation has been reported, a public exploit exists, increasing the likelihood of future attacks. The vendor has not issued any patches or advisories, leaving users exposed. The lack of vendor response suggests organizations must take independent action to secure their EasyCMS deployments. The vulnerability's presence in a widely used CMS component increases the attack surface for web applications relying on EasyCMS, especially those with public internet exposure.

Potential Impact

For European organizations, exploitation of this SQL injection vulnerability could lead to unauthorized access to sensitive data stored within EasyCMS databases, including user information, content management data, and potentially administrative credentials. Data integrity could be compromised by unauthorized modification or deletion of records, disrupting business operations or defacing websites. Availability impacts may occur if attackers execute commands that cause database errors or service crashes. Given EasyCMS’s role in content management, affected organizations may face reputational damage, regulatory compliance issues (e.g., GDPR breaches), and financial losses. Public-facing EasyCMS instances in sectors such as government, education, and media are particularly at risk. The absence of vendor patches increases the urgency for organizations to implement mitigations. The availability of public exploits raises the risk of automated scanning and exploitation campaigns targeting European infrastructure.

Mitigation Recommendations

European organizations should immediately audit their EasyCMS installations to identify affected versions (1.0 to 1.6). Since no official patches are available, organizations must implement manual mitigations: (1) Review and sanitize all inputs, especially the _order parameter in /UserAction.class.php, using strict whitelisting of allowed values or parameterized queries to prevent SQL injection. (2) Employ Web Application Firewalls (WAFs) configured with rules to detect and block SQL injection attempts targeting EasyCMS. (3) Restrict access to the CMS administration interface by IP whitelisting or VPN-only access to reduce exposure. (4) Monitor logs for suspicious query patterns or repeated access attempts to the vulnerable parameter. (5) Consider upgrading or migrating to a CMS platform with active security support if feasible. (6) Conduct regular security assessments and penetration tests focusing on injection flaws. (7) Educate development and IT teams about secure coding practices and the risks of unsanitized inputs. These steps will reduce the risk until an official patch or vendor guidance becomes available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-17T08:34:03.131Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696c1e39d302b072d936e490

Added to database: 1/17/2026, 11:41:45 PM

Last enriched: 1/25/2026, 7:46:16 PM

Last updated: 2/6/2026, 5:17:43 PM

Views: 143

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats