Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3200: SQL Injection in z-9527 admin

0
Medium
VulnerabilityCVE-2026-3200cvecve-2026-3200
Published: Wed Feb 25 2026 (02/25/2026, 20:02:08 UTC)
Source: CVE Database V5
Vendor/Project: z-9527
Product: admin

Description

A vulnerability was identified in z-9527 admin 1.0/2.0. The affected element is the function checkName/register/login/getUser/getUsers of the file /server/controller/user.js. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 02/25/2026, 20:41:16 UTC

Technical Analysis

CVE-2026-3200 is a remote SQL injection vulnerability identified in the z-9527 admin software versions 1.0 and 2.0. The vulnerability resides in the user management controller file (/server/controller/user.js), specifically in the functions checkName, register, login, getUser, and getUsers. These functions fail to properly sanitize or parameterize user-supplied input before incorporating it into SQL queries, allowing an attacker to inject malicious SQL commands. Because the attack vector is network accessible and requires no authentication or user interaction, an attacker can exploit this vulnerability remotely to manipulate the backend database. Potential consequences include unauthorized data disclosure, data modification, deletion, or even full system compromise depending on the database privileges. The vendor was contacted early but has not issued any patches or advisories, and exploit code is publicly available, increasing the risk of exploitation. The CVSS 4.0 score of 6.9 reflects medium severity, with low attack complexity and no privileges or user interaction required, but limited scope and impact on confidentiality, integrity, and availability. No known active exploitation has been reported to date.

Potential Impact

The SQL injection vulnerability in z-9527 admin can lead to significant impacts on affected organizations. Attackers can remotely execute arbitrary SQL commands, potentially leading to unauthorized access to sensitive user data, including credentials and personal information. Data integrity may be compromised through unauthorized modifications or deletions, disrupting business operations. In worst-case scenarios, attackers could escalate privileges or execute commands on the underlying system if the database user has excessive permissions, leading to full system compromise. The lack of vendor response and available exploit code increases the likelihood of exploitation attempts. Organizations relying on z-9527 admin for critical administrative functions face risks of data breaches, service disruption, and reputational damage. The medium severity rating suggests that while the vulnerability is serious, the impact might be limited by the scope of affected functions and database privileges.

Mitigation Recommendations

Given the absence of an official patch, organizations should immediately implement the following mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting the affected endpoints. 2) Restrict network access to the z-9527 admin interface to trusted IP addresses or VPNs to reduce exposure. 3) Conduct thorough input validation and sanitization on all user inputs at the application level, ideally by modifying the source code to use parameterized queries or prepared statements in the affected functions. 4) Monitor logs for suspicious activity indicative of SQL injection attempts, such as unusual query patterns or error messages. 5) Limit database user privileges to the minimum necessary to reduce potential damage from injection attacks. 6) Consider deploying runtime application self-protection (RASP) solutions to detect and block injection attacks in real time. 7) Prepare an incident response plan in case exploitation is detected. Organizations should also engage with the vendor for updates and plan to upgrade or replace the product once a fix is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-25T14:04:07.653Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f5b59b7ef31ef0b4d0f06

Added to database: 2/25/2026, 8:28:09 PM

Last enriched: 2/25/2026, 8:41:16 PM

Last updated: 2/26/2026, 12:34:23 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats