CVE-2018-25202

HIGH

SAT CFDI 3.3 SQL Injection via signIn endpoint

Title source: cna
STIX 2.1

Description

SAT CFDI 3.3 contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting SQL code through the 'id' parameter in the signIn endpoint. Attackers can submit POST requests with boolean-based blind, stacked queries, or time-based blind SQL injection payloads to extract sensitive data or compromise the application.

Exploits (1)

exploitdb WORKING POC
by AkkuS · textwebappsphp
https://www.exploit-db.com/exploits/44726

References (3)

Core 3
Core References
Exploit exploit
ExploitDB-44726
https://www.exploit-db.com/exploits/44726
Third Party Advisory third-party-advisory
VulnCheck Advisory: SAT CFDI 3.3 SQL Injection via signIn endpoint
https://www.vulncheck.com/advisories/sat-cfdi-sql-injection-via-signin-endpoint

Scores

CVSS v3 8.2
EPSS 0.0005
EPSS Percentile 14.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-89
Status published
Products (1)
Wecodex/SAT CFDI 3.3
Published Mar 26, 2026
Tracked Since Mar 26, 2026