Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade admidio/admidio to version 5.0.7 or higher.
admidio/admidio is a free open source user management system for websites of organizations and groups.
Affected versions of this package are vulnerable to SQL Injection in the processing of user-supplied values for list configuration fields such as lsc_special_field, lsc_sort, and lsc_filter. An attacker can execute arbitrary SQL commands by injecting malicious input into these fields, which are later interpolated directly into SQL queries without proper sanitization or parameterization. This can lead to unauthorized access, modification, or deletion of database contents, and potentially full compromise of the underlying database. This is only exploitable if an authenticated user with list edit permissions submits crafted input, as all logged-in users have this permission by default and the CSRF token is available within the same session.