CVE-2026-3292

Source
https://cve.org/CVERecord?id=CVE-2026-3292
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-3292.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-3292
Published
2026-02-27T05:18:21.927Z
Modified
2026-03-01T01:50:50.022499Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A security vulnerability has been detected in jizhiCMS up to 2.5.6. Affected is the function findAll in the library frphp/lib/Model.php of the component Batch Interface. The manipulation of the argument data leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

References

Affected packages

Git / github.com/cherry-toto/jizhicms

Affected ranges

Type
GIT
Repo
https://github.com/cherry-toto/jizhicms
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

2.*
2.3.3
2.3.4
2.3.5
2.3.7
2.3.8
2.4
2.4.0
2.4.3
2.4.7
2.4.8
2.4.9
2.5.0
2.5.1
2.5.2
2.5.3
2.5.4
2.5.6
Other
v1
v1.*
v1.4
v1.5
v1.5.1
v1.5.2
v1.6
v1.6.1
v1.6.2
v1.6.3
v1.6.4
v1.6.5
v1.6.6
v1.6.7
v1.7
v1.7.1
v1.8
v1.8.1
v1.9
v1.9.1
v1.9.2
v1.9.3
v1.9.4
v1.9.5
v1.9.x
v2.*
v2.4.5
v2.5.3
v2.5.4
v2.5.5

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-3292.json"