A security vulnerability has been detected in EyouCMS up to 1.7.9. The affected element is the function GetSortData of the file application/common.php. The manipulation of the argument sort_asc leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
EyouCMS common.php GetSortData sql injection
Problem type
Affected products
1.7.0 - AFFECTED
1.7.1 - AFFECTED
1.7.2 - AFFECTED
1.7.3 - AFFECTED
1.7.4 - AFFECTED
1.7.5 - AFFECTED
1.7.6 - AFFECTED
1.7.7 - AFFECTED
1.7.8 - AFFECTED
1.7.9 - AFFECTED
References
https://vuldb.com/vuln/360114
https://vuldb.com/vuln/360114/cti
https://vuldb.com/submit/803103
https://gitee.com/weng_xianhu/eyoucms/issues/IILFPE
GitHub Security Advisories
GHSA-f5gj-c2v7-5whv
A security vulnerability has been detected in EyouCMS up to 1.7.9. The affected element is the...
https://github.com/advisories/GHSA-f5gj-c2v7-5whvA security vulnerability has been detected in EyouCMS up to 1.7.9. The affected element is the function GetSortData of the file application/common.php. The manipulation of the argument sort_asc leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-7389Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-7389",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2026-04-29T15:30:18.641Z",
"dateReserved": "2026-04-29T09:35:05.397Z",
"datePublished": "2026-04-29T15:30:18.641Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2026-04-29T15:30:18.641Z"
},
"title": "EyouCMS common.php GetSortData sql injection",
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been detected in EyouCMS up to 1.7.9. The affected element is the function GetSortData of the file application/common.php. The manipulation of the argument sort_asc leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet."
}
],
"affected": [
{
"vendor": "n/a",
"product": "EyouCMS",
"cpes": [
"cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*"
],
"versions": [
{
"version": "1.7.0",
"status": "affected"
},
{
"version": "1.7.1",
"status": "affected"
},
{
"version": "1.7.2",
"status": "affected"
},
{
"version": "1.7.3",
"status": "affected"
},
{
"version": "1.7.4",
"status": "affected"
},
{
"version": "1.7.5",
"status": "affected"
},
{
"version": "1.7.6",
"status": "affected"
},
{
"version": "1.7.7",
"status": "affected"
},
{
"version": "1.7.8",
"status": "affected"
},
{
"version": "1.7.9",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "SQL Injection",
"cweId": "CWE-89",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Injection",
"cweId": "CWE-74",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/vuln/360114",
"name": "VDB-360114 | EyouCMS common.php GetSortData sql injection",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/vuln/360114/cti",
"name": "VDB-360114 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/submit/803103",
"name": "Submit #803103 | eyoucms EyouCMS <=1.7.9 SQL Injection",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://gitee.com/weng_xianhu/eyoucms/issues/IILFPE",
"tags": [
"exploit",
"issue-tracking"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 7.3,
"baseSeverity": "HIGH"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 7.3,
"baseSeverity": "HIGH"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"baseScore": 7.5
}
}
],
"timeline": [
{
"time": "2026-04-29T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2026-04-29T02:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2026-04-29T11:40:16.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "anch0r (VulDB User)",
"type": "reporter"
},
{
"lang": "en",
"value": "VulDB CNA Team",
"type": "coordinator"
}
]
}
}
}