Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27697: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in baserproject basercms

0
Medium
VulnerabilityCVE-2026-27697cvecve-2026-27697cwe-89
Published: Tue Mar 31 2026 (03/31/2026, 00:44:20 UTC)
Source: CVE Database V5
Vendor/Project: baserproject
Product: basercms

Description

CVE-2026-27697 is a medium-severity SQL injection vulnerability affecting baserCMS versions prior to 5. 2. 3. The flaw exists in the blog post functionality, where improper neutralization of special elements in SQL commands allows unauthenticated remote attackers to execute arbitrary SQL queries. This vulnerability does not require user interaction or privileges and can lead to partial compromise of confidentiality, integrity, and availability of the affected system. The issue has been patched in baserCMS version 5. 2. 3. No known exploits are currently reported in the wild. Organizations using vulnerable baserCMS versions should upgrade promptly to mitigate risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 01:25:58 UTC

Technical Analysis

CVE-2026-27697 is a SQL injection vulnerability classified under CWE-89, found in baserCMS, an open-source website development framework. The vulnerability affects versions prior to 5.2.3 and is specifically located in the blog post component of the CMS. It arises due to improper neutralization of special elements in SQL commands, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely over the network without requiring authentication or user interaction, making it relatively easy to exploit. The impact includes unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the backend database. The vulnerability has been assigned a CVSS 4.0 base score of 6.9, reflecting medium severity with network attack vector, low complexity, and no privileges or user interaction required. The vulnerability was publicly disclosed on March 31, 2026, and patched in baserCMS version 5.2.3. No active exploits have been reported so far, but the risk remains significant for unpatched systems. The flaw highlights the importance of proper input validation and parameterized queries in CMS development to prevent injection attacks.

Potential Impact

The SQL injection vulnerability can allow attackers to execute arbitrary SQL commands on the affected baserCMS database, leading to unauthorized data disclosure, data manipulation, or deletion. This can result in leakage of sensitive information such as user credentials, personal data, or business-critical content. Attackers could also corrupt or erase data, causing service disruption and loss of data integrity. Since the vulnerability requires no authentication and can be exploited remotely, it poses a significant risk to any publicly accessible baserCMS-based website. Organizations relying on baserCMS for their web presence may face reputational damage, regulatory compliance issues, and operational downtime if exploited. Although no known exploits are currently reported, the availability of a public patch means attackers could develop exploits targeting unpatched systems, increasing the threat over time.

Mitigation Recommendations

Organizations should immediately upgrade baserCMS installations to version 5.2.3 or later, where the vulnerability is patched. In addition to patching, administrators should audit their web applications for any custom plugins or extensions that interact with blog posts or database queries to ensure they use parameterized queries or prepared statements. Employing a web application firewall (WAF) with SQL injection detection rules can provide an additional layer of defense against exploitation attempts. Regularly monitoring logs for unusual database query patterns or repeated failed requests targeting blog post endpoints can help detect potential exploitation attempts early. It is also recommended to enforce the principle of least privilege on database accounts used by baserCMS, limiting their permissions strictly to what is necessary. Finally, organizations should maintain an up-to-date inventory of baserCMS versions deployed across their infrastructure to ensure timely patch management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-23T17:56:51.202Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cb1e82e6bfc5ba1d9722ad

Added to database: 3/31/2026, 1:08:18 AM

Last enriched: 3/31/2026, 1:25:58 AM

Last updated: 3/31/2026, 2:55:19 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses