Dismissed
Permalink
CVE-2026-1059
7.3 HIGH
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
5 packages
- dockapps.wmsm-app
- dockapps.wmsystemtray
- python312Packages.pywmspro
- python313Packages.pywmspro
- home-assistant-component-tests.wmspro
- @LeSuisse dismissed
FeMiner wms chkuser.php sql injection
A security vulnerability has been detected in FeMiner wms up to 9cad1f1b179a98b9547fd003c23b07c7594775fa. Affected by this vulnerability is an unknown functionality of the file /src/chkuser.php. The manipulation of the argument Username leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The vendor was contacted early about this disclosure but did not respond in any way.
References
- VDB-341628 | FeMiner wms chkuser.php sql injection vdb-entry technical-description
- VDB-341628 | CTI Indicators (IOB, IOC, TTP, IOA) signature permissions-required
- Submit #731236 | GitHub WMS (Warehouse Management System) V1.0 SQL Injection third-party-advisory
- https://github.com/wangchaoxing/CVE/issues/1 issue-tracking exploit
- VDB-341628 | FeMiner wms chkuser.php sql injection vdb-entry technical-description
- VDB-341628 | CTI Indicators (IOB, IOC, TTP, IOA) signature permissions-required
- Submit #731236 | GitHub WMS (Warehouse Management System) V1.0 SQL Injection third-party-advisory
- https://github.com/wangchaoxing/CVE/issues/1 issue-tracking exploit
- https://github.com/wangchaoxing/CVE/issues/1 exploit
Affected products
wms
- ==9cad1f1b179a98b9547fd003c23b07c7594775fa