Description
SQL injection vulnerability in xhr.php in InterWorx Web Control Panel (aka InterWorx Hosting Control Panel and InterWorx-CP) before 5.0.14 build 577 allows remote authenticated users to execute arbitrary SQL commands via the i parameter in a search action to the (1) NodeWorx , (2) SiteWorx, or (3) Resellers interface, as demonstrated by the "or" key in a pgn8state object in an i object in a JSON object.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Eric Flokstra · textwebappsphp
https://www.exploit-db.com/exploits/32516
References (3)
Core 3
Core References
Various Sources x_refsource_confirm
http://forums.interworx.com/threads/8000-InterWorx-Version-5-0-14-Released-on-Beta-Channel%21
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/32516
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/531601/100/0/threaded
Scores
EPSS
0.0169
EPSS Percentile
82.3%
Details
CWE
CWE-89
Status
published
Products (1)
interworx/web_control_panel
< 5.0.13
Published
Oct 21, 2014
Tracked Since
Feb 18, 2026