CVE-2024-31212

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-31212
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-31212.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-31212
Aliases
  • GHSA-qx95-w566-73fw
Published
2024-04-04T23:02:38Z
Modified
2025-11-04T19:33:27Z
Severity
  • 6.7 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L CVSS Calculator
Summary
SQL injection in index_chart_data action
Details

InstantCMS is a free and open source content management system. A SQL injection vulnerability affects instantcms v2.16.2 in which an attacker with administrative privileges can cause the application to execute unauthorized SQL code. The vulnerability exists in indexchartdata action, which receives an input from user and passes it unsanitized to the core model filterFunc function that further embeds this data in an SQL statement. This allows attackers to inject unwanted SQL code into the statement. The period should be escaped before inserting it in the query. As of time of publication, a patched version is not available.

Database specific
{
    "cwe_ids": [
        "CWE-20",
        "CWE-89"
    ]
}
References

Affected packages

Git /

Affected ranges