CVE-2016-7400
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
07/02/2017
Last modified:
20/04/2025
Description
Multiple SQL injection vulnerabilities in Exponent CMS before 2.4.0 allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in an activate_address address controller action, (2) title parameter in a show blog controller action, or (3) content_id parameter in a showComments expComment controller action.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:exponentcms:exponent_cms:*:*:*:*:*:*:*:* | 2.3.9 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2016/09/18/10
- http://www.openwall.com/lists/oss-security/2016/09/18/2
- http://www.securityfocus.com/bid/93041
- https://exponentcms.lighthouseapp.com/projects/61783/changesets/e916702a91a6342bbab483a2be2ba2f11dca3aa3
- https://github.com/exponentcms/exponent-cms/commit/e916702a91a6342bbab483a2be2ba2f11dca3aa3
- https://github.com/exponentcms/exponent-cms/releases/tag/v2.4.0
- https://www.exploit-db.com/exploits/40412/
- http://www.openwall.com/lists/oss-security/2016/09/18/10
- http://www.openwall.com/lists/oss-security/2016/09/18/2
- http://www.securityfocus.com/bid/93041
- https://exponentcms.lighthouseapp.com/projects/61783/changesets/e916702a91a6342bbab483a2be2ba2f11dca3aa3
- https://github.com/exponentcms/exponent-cms/commit/e916702a91a6342bbab483a2be2ba2f11dca3aa3
- https://github.com/exponentcms/exponent-cms/releases/tag/v2.4.0
- https://www.exploit-db.com/exploits/40412/



