Joomla! Component EkRishta 2.10 contains an error-based SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the username parameter. Attackers can submit POST requests to the login endpoint with SQL injection payloads in the username field to extract database information including user credentials and system details.
Metrics
Affected Vendors & Products
References
History
Sat, 23 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Joomla! Component EkRishta 2.10 contains an error-based SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the username parameter. Attackers can submit POST requests to the login endpoint with SQL injection payloads in the username field to extract database information including user credentials and system details. | |
| Title | Joomla! Component EkRishta 2.10 SQL Injection via username | |
| First Time appeared |
Harmistechnology
Harmistechnology ek Rishta |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:harmistechnology:ek_rishta:2.10:*:*:*:*:joomla\!:*:* | |
| Vendors & Products |
Harmistechnology
Harmistechnology ek Rishta |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-05-23T18:30:51.894Z
Updated: 2026-05-23T18:30:51.894Z
Reserved: 2026-05-23T15:35:35.751Z
Link: CVE-2018-25351
No data.
No data.
No data.
ReportizFlow