Sploit.io - Search

Product: S-CMS, version: 2.0_build20220529-20231006

CVE-2023-7189

Severity: MEDIUM

Description: A vulnerability classified as critical was found in S-CMS up to 2.0_build20220529-20231006. Affected by this vulnerability is an unknown functionality of the file /s/index.php?action=statistics. The manipulation of the argument lid leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249391. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Score: 5.5

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000450000
  • Percentile: 0.136030000
  • Date: 2026-04-26

ExploitDB

No data available.

HackerOne Data

  • Rank: 9187
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • n/a S-CMS - Versions: 2.0_build20220529-20231006

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, a SQL injection flaw within S-CMS version 2.0_build20220529-20231006, poses a medium risk to organizations utilizing this software. The vulnerability resides in the /s/index.php?action=statistics file and is triggered by manipulating the ‘lid’ argument. SQL injection vulnerabilities allow attackers to insert malicious SQL code into database queries, potentially gaining unauthorized access to sensitive data. Given the vendor was contacted but did not respond, the likelihood of widespread exploitation is increased. The CVSS score of 5.5 indicates a medium severity, with attack vector being Adjacent Network (requiring some level of access to the system), low attack complexity, and low impact to Confidentiality, Integrity and Availability. Business impact could range from data breaches of customer or internal information to potential defacement of the S-CMS installation or disruption of services. The EPSS score is quite low at 0.00045, suggesting the vulnerability might not be widely exploited, but the publicly available exploit increases the possibility.

    2. Potential Attack Scenarios
    An attacker with limited network access to the S-CMS instance can leverage this SQL injection vulnerability to extract sensitive data. The attack scenario unfolds as follows:
    The attacker identifies the vulnerable endpoint /s/index.php?action=statistics and crafts a malicious URL by modifying the ‘lid’ parameter. For example, the attacker might append a SQL injection payload to the 'lid' parameter like: /s/index.php?action=statistics&lid=1' OR '1'='1. This payload, when processed by the application, alters the SQL query to return all records from the affected table. The attacker then analyzes the returned data to identify potentially sensitive information, such as usernames, passwords, or other critical business data. Depending on the database permissions, the attacker could also modify or delete data, potentially disrupting the application’s functionality. The exploit, as indicated by PacketStorm, is publicly available making exploitation relatively straightforward.

    3. Mitigation Recommendations
    The primary mitigation strategy is to upgrade to a patched version of S-CMS, if one becomes available. Since the vendor was unresponsive, organizations may need to consider alternative solutions or implement short-term mitigations.
    Immediate Actions:
    Implement Web Application Firewall (WAF) rules to filter malicious SQL injection attempts targeting the /s/index.php?action=statistics endpoint.
    Input Validation: Enforce strict input validation on the ‘lid’ parameter, ensuring it conforms to the expected data type and length.
    Least Privilege: Ensure the database user account used by S-CMS has only the necessary permissions to perform its functions, limiting the impact of a successful SQL injection.
    Regular Monitoring: Monitor database activity for unusual queries or data access patterns that could indicate exploitation.
    Resources:
    VulDB: https://vuldb.com/?id.249391
    PacketStorm: https://packetstormsecurity.com/search/?q=CVE-2023-7189

    4. Executive Summary
    S-CMS, a software package up to version 2.0_build20220529-20231006, is vulnerable to a SQL injection attack. This vulnerability allows attackers to potentially access, modify, or delete data stored in the S-CMS database. While the risk is currently assessed as medium, the publicly available exploit increases the likelihood of successful exploitation. The vendor has been slow to respond to this issue. Organizations using S-CMS should implement immediate mitigations, such as WAF rules and input validation, and prioritize upgrading to a patched version when available. Failing to address this vulnerability could lead to data breaches, service disruptions, and potential reputational damage. The business impact is moderate, but warrants prompt attention, especially given the lack of vendor support.

    CVE-2023-7190

    Severity: MEDIUM

    Description: A vulnerability, which was classified as critical, has been found in S-CMS up to 2.0_build20220529-20231006. Affected by this issue is some unknown functionality of the file /member/ad.php?action=ad. The manipulation of the argument A_text/A_url/A_contact leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249392. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

    CVSS Score: 5.5

    Priority

    D

    CISA Data

    EPSS Data

    • EPSS: 0.000450000
    • Percentile: 0.136030000
    • Date: 2026-04-26

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 9183
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • n/a S-CMS - Versions: 2.0_build20220529-20231006

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability CVE-2023-7190 is a SQL injection flaw within the S-CMS application, specifically affecting the /member/ad.php file when handling the A_text, A_url, or A_contact arguments. The vulnerability is rated as Medium severity (CVSS score of 5.5), indicating a moderate level of risk. The attack vector is Adjacent, meaning an attacker needs some level of access to the S-CMS instance, likely through web access. The attack complexity is Low, suggesting exploitation is relatively straightforward. Privileges required are Low, meaning a standard, authenticated user or even a session hijacker could potentially exploit the vulnerability. The impact of successful exploitation is Low for confidentiality, integrity, and availability, meaning attackers could potentially retrieve sensitive data, modify data, or cause a minor disruption of service. The vendor’s lack of response to the initial disclosure suggests patching may take time, increasing the window of opportunity for attackers. The EPSS score of 0.00045 indicates the vulnerability is not widely exploited yet, but the publicly available exploit increases the likelihood of exploitation. Business impact could include data breaches, website defacement, and potentially disruption of member-related functionalities within S-CMS.

      2. Potential Attack Scenarios
      An attacker could leverage this SQL injection vulnerability to gain access to sensitive member data. The scenario begins with an attacker discovering the S-CMS instance and identifying the /member/ad.php endpoint. They then craft a malicious input for the A_text argument, injecting SQL code designed to bypass authentication. For example, an attacker could insert a SQL query to retrieve all usernames and passwords from the member database. The attacker submits the crafted request to the /member/ad.php endpoint. The S-CMS application, failing to properly sanitize the input, incorporates the malicious SQL code into its database query. The database executes the injected SQL code, returning the usernames and passwords to the attacker. The attacker can then use these credentials to log in as various members, potentially gaining access to privileged accounts or member-specific data. The potential outcome is a compromise of member data, potentially leading to identity theft or further attacks.

      3. Mitigation Recommendations
      The primary mitigation for CVE-2023-7190 is to upgrade to a patched version of S-CMS. While the latest build is not explicitly stated in the CVE details, checking for the latest version available from the S-CMS vendor is crucial. If patching immediately isn’t possible, implement input validation and sanitization for the A_text, A_url, and A_contact arguments in /member/ad.php. Use parameterized queries or prepared statements to prevent SQL injection. Web application firewalls (WAFs) can be deployed to filter malicious SQL injection attempts. Regularly monitor S-CMS logs for suspicious SQL queries. Consider implementing least privilege principles for database access, limiting the user account S-CMS uses to only the necessary permissions. Relevant resources include the VulDB entry at https://vuldb.com/?id.249392 and the exploit details at https://packetstormsecurity.com/search/?q=CVE-2023-7190.

      4. Executive Summary
      S-CMS is vulnerable to a SQL injection flaw (CVE-2023-7190) that could allow attackers to steal member data, modify information, or disrupt service. The vulnerability resides in the /member/ad.php file and is relatively easy to exploit. While the risk is currently rated as Medium, the publicly available exploit means the risk of exploitation is increasing. The vendor has been slow to respond, potentially delaying a patch. We recommend prioritizing patching S-CMS to the latest version. If immediate patching is not feasible, implementing input validation and deploying a Web Application Firewall are crucial steps to mitigate the risk. Addressing this vulnerability is important to protect member data and maintain the integrity of our S-CMS system. Failure to address this could lead to data breaches, impacting customer trust and potentially resulting in financial loss.

      CVE-2023-7191

      Severity: MEDIUM

      Description: A vulnerability, which was classified as critical, was found in S-CMS up to 2.0_build20220529-20231006. This affects an unknown part of the file member/reg.php. The manipulation of the argument M_login/M_email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249393 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

      CVSS Score: 5.5

      Priority

      D

      CISA Data

      EPSS Data

      • EPSS: 0.000450000
      • Percentile: 0.136030000
      • Date: 2026-04-26

      ExploitDB

      No data available.

      HackerOne Data

      • Rank: 9187
      • Reports submitted count: 0
      • Unknown: 0
      • None: 0
      • Low: 0
      • Medium: 0
      • High: 0
      • Critical: 0

      GitHub PoCs

        Nuclei Templates

        No data available.

        VulnCheck Data

        Affected Products:

        • n/a S-CMS - Versions: 2.0_build20220529-20231006

        References:

        Risk Assessment

        1. Risk Assessment
        The vulnerability CVE-2023-7191 is a SQL injection flaw within the S-CMS application, specifically in the member/reg.php file when handling the M_login/M_email argument. The vulnerability is classified as medium severity with a CVSS score of 5.5, indicating a moderate risk. Exploitation requires local access, meaning an attacker likely needs some level of existing access to the S-CMS system, perhaps through a user account or a network connection. However, the attack complexity is low, and no user interaction is required, making exploitation relatively straightforward once access is gained. Successful exploitation can lead to limited compromise of confidentiality, integrity, and availability. An attacker could potentially extract sensitive data from the database, modify existing data, or cause minor disruptions to service. The business impact is moderate, potentially leading to data breaches, data corruption, or service degradation. The vendor’s lack of response to the initial disclosure adds to the risk, suggesting potential delays in future patching or updates. The EPSS score is very low (0.000450000), implying relatively infrequent exploitation in the wild, but the publicly available exploit increases the likelihood.

        2. Potential Attack Scenarios
        An attacker with local access to the S-CMS system could exploit this vulnerability by crafting a malicious input for the M_login or M_email parameter in a request to member/reg.php. For example, an attacker could submit a request with M_login=' or '1'='1 to bypass authentication or retrieve all records from a user table. The attack process involves sending the crafted request to the S-CMS server, the server executing the SQL query with the injected code, and the database returning the results to the attacker. The potential outcome is that the attacker could retrieve sensitive user information (usernames, passwords, email addresses), modify user account details, or even gain full control of the database depending on the privileges of the database user S-CMS uses. Another scenario involves injecting a union select statement to retrieve data from other tables within the database, potentially revealing additional sensitive information beyond user credentials. The exploit found at PacketStormSecurity.com further illustrates the ease of exploitation.

        3. Mitigation Recommendations
        The primary mitigation recommendation is to patch the S-CMS application to the latest version that addresses CVE-2023-7191. Since the vendor was slow to respond initially, diligent monitoring of future updates is critical. If a patch isn’t immediately available, several immediate steps can be taken. Input validation and sanitization of the M_login/M_email parameter should be implemented to prevent malicious SQL code from being executed. This can be achieved through parameterized queries or escaping special characters. Utilizing a Web Application Firewall (WAF) can help filter out malicious requests and detect SQL injection attempts. Regularly auditing database access and permissions can limit the impact of a successful attack. Consider using least privilege principles when configuring database user accounts for S-CMS. Relevant resources include the VulDB entry at https://vuldb.com/?id.249393 and the exploit details on PacketStormSecurity at https://packetstormsecurity.com/search/?q=CVE-2023-7191.

        4. Executive Summary
        S-CMS is vulnerable to a SQL injection attack (CVE-2023-7191) that could allow an attacker to steal, modify, or disrupt data stored within the application’s database. While the vulnerability is currently considered medium severity, its ease of exploitation and the availability of a public exploit make it a significant risk. The vendor's initial lack of responsiveness indicates a potential challenge with ongoing support and future patching. We recommend prioritizing patching S-CMS to the latest version. If patching is delayed, implement input validation and consider using a Web Application Firewall. This vulnerability could lead to data breaches, impacting customer trust and potentially leading to financial loss. Prompt action is important to minimize the business impact and maintain the integrity of the S-CMS application and its data.