
Cloud Vulnerability DB
A community-led vulnerabilities database
MCMS v5.2.5 was discovered to contain a SQL injection vulnerability in the search.do functionality within the file /web/MCmsAction.java (NVD, MITRE). The vulnerability was identified and disclosed in January 2022.
The vulnerability exists due to improper input validation where parameter names are directly concatenated with strings without proper filtering in the MCmsAction.java file. The vulnerability can be exploited via the search.do endpoint. The CVSS v3.1 base score is 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD).
If exploited, this SQL injection vulnerability could allow an attacker to access, modify, or delete data in the backend database. Given the CVSS score of 9.8, the vulnerability has potential for high impact on confidentiality, integrity, and availability of the system (NVD).
Users should upgrade to a version newer than MCMS v5.2.5. If upgrading is not immediately possible, implementing proper input validation and parameterized queries for the search functionality can help mitigate the risk (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."