SQL injection (SQLi) in MegaCMS v12.0.0, specifically in the “id_territorio” parameter of the “/web_comunications/cms/get_provincias” endpoint. The vulnerability arises from inadequate validation and sanitisation of user input. Specifically, via a POST request, the “id_territorio” parameter, used immediately after the registration form is submitted, could be manipulated by an unauthenticated attacker to execute arbitrary SQL queries.
Metrics
Affected Vendors & Products
References
History
Thu, 30 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Crm Sistemas De Fidelización
Crm Sistemas De Fidelización megacms |
|
| Vendors & Products |
Crm Sistemas De Fidelización
Crm Sistemas De Fidelización megacms |
Wed, 29 Apr 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SQL injection (SQLi) in MegaCMS v12.0.0, specifically in the “id_territorio” parameter of the “/web_comunications/cms/get_provincias” endpoint. The vulnerability arises from inadequate validation and sanitisation of user input. Specifically, via a POST request, the “id_territorio” parameter, used immediately after the registration form is submitted, could be manipulated by an unauthenticated attacker to execute arbitrary SQL queries. | |
| Title | SQL injection in MegaCMS by CRM Sistemas de Fidelización | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published: 2026-04-29T08:37:32.529Z
Updated: 2026-04-29T12:06:07.199Z
Reserved: 2026-02-27T13:20:09.388Z
Link: CVE-2026-3325
Updated: 2026-04-29T12:05:56.574Z
Status : Awaiting Analysis
Published: 2026-04-29T09:16:24.130
Modified: 2026-04-30T15:48:26.580
Link: CVE-2026-3325
No data.
ReportizFlow