WebOfisi E-Ticaret 4.0 contains an SQL injection vulnerability in the 'urun' GET parameter of the endpoint that allows unauthenticated attackers to manipulate database queries. Attackers can inject SQL payloads through the 'urun' parameter to execute boolean-based blind, error-based, time-based blind, and stacked query attacks against the backend database.
References
| Link | Resource |
|---|---|
| https://drive.google.com/file/d/1ZghFSsYto-Vpv3PXunx8xm2g-Gs3HJwz/view?usp=sharing | Broken Link |
| https://www.exploit-db.com/exploits/45897 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/webofisi-e-ticaret-sql-injection-via-urun-parameter | Third Party Advisory |
| https://www.web-ofisi.com | Product |
Configurations
History
27 Mar 2026, 18:29
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Web-ofisi e-ticaret
Web-ofisi |
|
| CPE | cpe:2.3:a:web-ofisi:e-ticaret:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| References | () https://drive.google.com/file/d/1ZghFSsYto-Vpv3PXunx8xm2g-Gs3HJwz/view?usp=sharing - Broken Link | |
| References | () https://www.exploit-db.com/exploits/45897 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/webofisi-e-ticaret-sql-injection-via-urun-parameter - Third Party Advisory | |
| References | () https://www.web-ofisi.com - Product |
26 Mar 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-26 12:16
Updated : 2026-03-27 18:29
NVD link : CVE-2018-25210
Mitre link : CVE-2018-25210
CVE.ORG link : CVE-2018-25210
JSON object : View
Products Affected
web-ofisi
- e-ticaret
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
