CVE-2024-44838

RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerability via the username parameter at /resource/runlogin.php.
References
Link Resource
https://github.com/OpenRapid/rapidcms/issues/17 Exploit Third Party Advisory Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*

History

22 Apr 2025, 14:04

Type Values Removed Values Added
First Time Openrapid
Openrapid rapidcms
CPE cpe:2.3:a:openrapid:rapidcms:1.3.1:*:*:*:*:*:*:*
References () https://github.com/OpenRapid/rapidcms/issues/17 - () https://github.com/OpenRapid/rapidcms/issues/17 - Exploit, Third Party Advisory, Issue Tracking

09 Sep 2024, 14:35

Type Values Removed Values Added
CWE CWE-89
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

09 Sep 2024, 13:03

Type Values Removed Values Added
Summary
  • (es) Se descubrió que RapidCMS v1.3.1 contenía una vulnerabilidad de inyección SQL a través del parámetro de nombre de usuario en /resource/runlogin.php.

06 Sep 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-06 22:15

Updated : 2025-04-22 14:04


NVD link : CVE-2024-44838

Mitre link : CVE-2024-44838

CVE.ORG link : CVE-2024-44838


JSON object : View

Products Affected

openrapid

  • rapidcms
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')