Sploit.io - Search

Product: S-CMS, version: 5.0

CVE-2023-51051

Severity: CRITICAL

Description: S-CMS v5.0 was discovered to contain a SQL injection vulnerability via the A_textauth parameter at /admin/ajax.php.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.002820000
  • Percentile: 0.516310000
  • Date: 2026-04-19

ExploitDB

No data available.

HackerOne Data

  • Rank: 9115
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • n/a n/a - Versions: n/a

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2023-51051 is a SQL injection flaw within the S-CMS version 5.0 application, specifically affecting the A_textauth parameter in the /admin/ajax.php file. This allows an attacker to potentially execute arbitrary SQL queries against the underlying database. Given the CVSS v3.1 score of 9.8 (Critical), the risk is high. The vulnerability is easily exploitable, requiring no user interaction and can be leveraged remotely via network access. A successful exploit could lead to full compromise of the database, impacting Confidentiality (sensitive data exposure), Integrity (data modification or deletion), and Availability (potential database downtime or application unresponsiveness). The EPSS score of 0.002820000 indicates a relatively low, but still present, probability of exploitation. The impact is significant if the S-CMS application handles sensitive data, such as user credentials, financial information, or proprietary data.

    2. Potential Attack Scenarios
    An attacker could exploit this SQL injection vulnerability to gain administrative access to the S-CMS system. The attack vector is network-based, requiring only access to the /admin/ajax.php endpoint. The attacker crafts a malicious request to /admin/ajax.php, manipulating the A_textauth parameter with a SQL injection payload. For example, the payload could be designed to bypass authentication by inserting a SQL query that always returns true. Once authenticated, the attacker could execute commands to dump the entire database, modify existing data, or even create new administrative accounts. The potential outcome is complete control of the S-CMS application and the underlying data, potentially leading to data breaches, website defacement, or service disruption. The attacker could also leverage the database connection to potentially move laterally within the network if the database has access to other systems.

    3. Mitigation Recommendations
    The primary mitigation for CVE-2023-51051 is to upgrade the S-CMS application to a version that addresses the vulnerability. Patching should be prioritized. If an immediate upgrade is not possible, the following measures can be taken: Implement input validation on the A_textauth parameter to ensure it only contains expected characters and data types. Utilize parameterized queries or prepared statements when interacting with the database, which helps to prevent SQL injection by treating user input as data rather than executable code. Implement a Web Application Firewall (WAF) to filter malicious SQL injection payloads. Regularly monitor database activity for suspicious queries. Consider restricting network access to the /admin/ajax.php endpoint to only trusted IP addresses or networks. Refer to the following resource for further information: https://www.notion.so/scms5-0-sql-injection-94c791a563d1481a9439fa98a1bc9a1b

    4. Executive Summary
    S-CMS version 5.0 is vulnerable to a critical SQL injection flaw that could allow attackers to fully compromise the application and its underlying data. This vulnerability, tracked as CVE-2023-51051, allows an attacker to manipulate database queries, potentially leading to data breaches, data modification, or service disruption. The risk is high due to the vulnerability's ease of exploitation and the potential for significant impact. We recommend prioritizing patching the S-CMS application to the latest version. If immediate patching is not feasible, implement input validation and consider utilizing a Web Application Firewall. Addressing this vulnerability is crucial to protect sensitive data and ensure the continued availability of the S-CMS application. Failure to address this vulnerability could result in significant business impact, including potential financial loss and reputational damage.