CVE-2014-5387
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
04/11/2014
Last modified:
12/04/2025
Description
Multiple SQL injection vulnerabilities in EllisLab ExpressionEngine before 2.9.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) column_filter or (2) category[] parameter to system/index.php or the (3) tbl_sort[0][] parameter in the comment module to system/index.php.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ellislab:expressionengine:2..5.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ellislab:expressionengine:2.0.0:public_beta:*:*:*:*:*:* | ||
| cpe:2.3:a:ellislab:expressionengine:2.0.1:public_beta:*:*:*:*:*:* | ||
| cpe:2.3:a:ellislab:expressionengine:2.0.2:public_beta:*:*:*:*:*:* | ||
| cpe:2.3:a:ellislab:expressionengine:2.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ellislab:expressionengine:2.5.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ellislab:expressionengine:2.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ellislab:expressionengine:2.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ellislab:expressionengine:2.7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ellislab:expressionengine:2.8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:expressionengine:expressionengine:*:*:*:*:*:*:*:* | 2.9.0 (including) | |
| cpe:2.3:a:expressionengine:expressionengine:2.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:expressionengine:expressionengine:2.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:expressionengine:expressionengine:2.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:expressionengine:expressionengine:2.1.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/128946/EllisLab-ExpressionEngine-Core-SQL-Injection.html
- http://seclists.org/fulldisclosure/2014/Nov/2
- http://www.securityfocus.com/bid/70875
- https://ellislab.com/expressionengine/user-guide/about/changelog.html
- https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-5387
- http://packetstormsecurity.com/files/128946/EllisLab-ExpressionEngine-Core-SQL-Injection.html
- http://seclists.org/fulldisclosure/2014/Nov/2
- http://www.securityfocus.com/bid/70875
- https://ellislab.com/expressionengine/user-guide/about/changelog.html
- https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-5387



