A security vulnerability has been detected in jizhiCMS up to 2.5.6. Affected is the function findAll in the library frphp/lib/Model.php of the component Batch Interface. The manipulation of the argument data leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://gist.github.com/0psPwn/46468da7329f7c676c737b4b6b473ddc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.348018 | Permissions Required VDB Entry |
| https://vuldb.com/?id.348018 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.760180 | Third Party Advisory VDB Entry |
Configurations
History
27 Feb 2026, 18:32
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:jizhicms:jizhicms:*:*:*:*:*:*:*:* | |
| References | () https://gist.github.com/0psPwn/46468da7329f7c676c737b4b6b473ddc - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.348018 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.348018 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.760180 - Third Party Advisory, VDB Entry | |
| First Time |
Jizhicms
Jizhicms jizhicms |
27 Feb 2026, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
27 Feb 2026, 05:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 05:18
Updated : 2026-02-27 18:32
NVD link : CVE-2026-3292
Mitre link : CVE-2026-3292
CVE.ORG link : CVE-2026-3292
JSON object : View
Products Affected
jizhicms
- jizhicms
