CVE-2018-25210

WebOfisi E-Ticaret 4.0 contains an SQL injection vulnerability in the 'urun' GET parameter of the endpoint that allows unauthenticated attackers to manipulate database queries. Attackers can inject SQL payloads through the 'urun' parameter to execute boolean-based blind, error-based, time-based blind, and stacked query attacks against the backend database.
Configurations

Configuration 1 (hide)

cpe:2.3:a:web-ofisi:e-ticaret:*:*:*:*:*:*:*:*

History

27 Mar 2026, 18:29

Type Values Removed Values Added
First Time Web-ofisi e-ticaret
Web-ofisi
CPE cpe:2.3:a:web-ofisi:e-ticaret:*:*:*:*:*:*:*:*
Summary
  • (es) WebOfisi E-Ticaret 4.0 contiene una vulnerabilidad de inyección SQL en el parámetro GET 'urun' del endpoint que permite a atacantes no autenticados manipular consultas de la base de datos. Los atacantes pueden inyectar cargas útiles SQL a través del parámetro 'urun' para ejecutar ataques de inyección SQL ciegos basados en booleanos, basados en errores, ciegos basados en tiempo y de consultas apiladas contra la base de datos de backend.
References () https://drive.google.com/file/d/1ZghFSsYto-Vpv3PXunx8xm2g-Gs3HJwz/view?usp=sharing - () https://drive.google.com/file/d/1ZghFSsYto-Vpv3PXunx8xm2g-Gs3HJwz/view?usp=sharing - Broken Link
References () https://www.exploit-db.com/exploits/45897 - () https://www.exploit-db.com/exploits/45897 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/webofisi-e-ticaret-sql-injection-via-urun-parameter - () https://www.vulncheck.com/advisories/webofisi-e-ticaret-sql-injection-via-urun-parameter - Third Party Advisory
References () https://www.web-ofisi.com - () https://www.web-ofisi.com - Product

26 Mar 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-26 12:16

Updated : 2026-03-27 18:29


NVD link : CVE-2018-25210

Mitre link : CVE-2018-25210

CVE.ORG link : CVE-2018-25210


JSON object : View

Products Affected

web-ofisi

  • e-ticaret
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')