
Cloud Vulnerability DB
A community-led vulnerabilities database
A SQL injection vulnerability was discovered in Mingsoft MCMS version 5.2.8. The vulnerability exists in the /mdiy/page/verify URI via the fieldName parameter. This security flaw was identified and reported on July 17, 2022 (CVE Details, GitHub Issue).
The vulnerability is located in the backend route /${ms.manager.path}/mdiy/page/verify. The issue stems from the validated method in both if and else conditions, which inherits from a parent class. The method copies the fieldName and fieldValue parameters into a where object and calls the appBiz.queryBySQL method, which ultimately executes SQL queries without proper sanitization (GitHub Issue).
When successfully exploited, this vulnerability allows attackers to inject and execute arbitrary SQL commands in the backend database, potentially leading to unauthorized data access, modification, or deletion of database contents (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."