2026-04-29 15:30CVE-2026-7389VulDB
PUBLISHED5.2ApplicationCWE-89CWE-74

EyouCMS common.php GetSortData sql injection

A security vulnerability has been detected in EyouCMS up to 1.7.9. The affected element is the function GetSortData of the file application/common.php. The manipulation of the argument sort_asc leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Problem type

Affected products

EyouCMS

1.7.0 - AFFECTED

1.7.1 - AFFECTED

1.7.2 - AFFECTED

1.7.3 - AFFECTED

1.7.4 - AFFECTED

1.7.5 - AFFECTED

1.7.6 - AFFECTED

1.7.7 - AFFECTED

1.7.8 - AFFECTED

1.7.9 - AFFECTED

References

GitHub Security Advisories

GHSA-f5gj-c2v7-5whv

A security vulnerability has been detected in EyouCMS up to 1.7.9. The affected element is the...

https://github.com/advisories/GHSA-f5gj-c2v7-5whv

A security vulnerability has been detected in EyouCMS up to 1.7.9. The affected element is the function GetSortData of the file application/common.php. The manipulation of the argument sort_asc leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-7389
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-7389",
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "dateUpdated": "2026-04-29T15:30:18.641Z",
    "dateReserved": "2026-04-29T09:35:05.397Z",
    "datePublished": "2026-04-29T15:30:18.641Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB",
        "dateUpdated": "2026-04-29T15:30:18.641Z"
      },
      "title": "EyouCMS common.php GetSortData sql injection",
      "descriptions": [
        {
          "lang": "en",
          "value": "A security vulnerability has been detected in EyouCMS up to 1.7.9. The affected element is the function GetSortData of the file application/common.php. The manipulation of the argument sort_asc leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet."
        }
      ],
      "affected": [
        {
          "vendor": "n/a",
          "product": "EyouCMS",
          "cpes": [
            "cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*"
          ],
          "versions": [
            {
              "version": "1.7.0",
              "status": "affected"
            },
            {
              "version": "1.7.1",
              "status": "affected"
            },
            {
              "version": "1.7.2",
              "status": "affected"
            },
            {
              "version": "1.7.3",
              "status": "affected"
            },
            {
              "version": "1.7.4",
              "status": "affected"
            },
            {
              "version": "1.7.5",
              "status": "affected"
            },
            {
              "version": "1.7.6",
              "status": "affected"
            },
            {
              "version": "1.7.7",
              "status": "affected"
            },
            {
              "version": "1.7.8",
              "status": "affected"
            },
            {
              "version": "1.7.9",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "SQL Injection",
              "cweId": "CWE-89",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Injection",
              "cweId": "CWE-74",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://vuldb.com/vuln/360114",
          "name": "VDB-360114 | EyouCMS common.php GetSortData sql injection",
          "tags": [
            "vdb-entry",
            "technical-description"
          ]
        },
        {
          "url": "https://vuldb.com/vuln/360114/cti",
          "name": "VDB-360114 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ]
        },
        {
          "url": "https://vuldb.com/submit/803103",
          "name": "Submit #803103 | eyoucms EyouCMS <=1.7.9 SQL Injection",
          "tags": [
            "third-party-advisory"
          ]
        },
        {
          "url": "https://gitee.com/weng_xianhu/eyoucms/issues/IILFPE",
          "tags": [
            "exploit",
            "issue-tracking"
          ]
        }
      ],
      "metrics": [
        {},
        {
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
            "baseScore": 7.3,
            "baseSeverity": "HIGH"
          }
        },
        {
          "cvssV3_0": {
            "version": "3.0",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
            "baseScore": 7.3,
            "baseSeverity": "HIGH"
          }
        },
        {
          "cvssV2_0": {
            "version": "2.0",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
            "baseScore": 7.5
          }
        }
      ],
      "timeline": [
        {
          "time": "2026-04-29T00:00:00.000Z",
          "lang": "en",
          "value": "Advisory disclosed"
        },
        {
          "time": "2026-04-29T02:00:00.000Z",
          "lang": "en",
          "value": "VulDB entry created"
        },
        {
          "time": "2026-04-29T11:40:16.000Z",
          "lang": "en",
          "value": "VulDB entry last update"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "anch0r (VulDB User)",
          "type": "reporter"
        },
        {
          "lang": "en",
          "value": "VulDB CNA Team",
          "type": "coordinator"
        }
      ]
    }
  }
}