CVE-2018-25209

HIGH

OpenBiz Cubi Lite 3.0.8 SQL Injection via username Parameter

Title source: cna
STIX 2.1

Description

OpenBiz Cubi Lite 3.0.8 contains a SQL injection vulnerability in the login form that allows unauthenticated attackers to manipulate database queries through the username parameter. Attackers can submit POST requests to /bin/controller.php with malicious SQL code in the username field to extract sensitive database information or bypass authentication.

Exploits (1)

exploitdb WORKING POC
by AkkuS · textwebappsphp
https://www.exploit-db.com/exploits/45801

References (4)

Core 4
Core References
Exploit exploit
ExploitDB-45801
https://www.exploit-db.com/exploits/45801
Product product
Official Product Homepage
https://sourceforge.net/projects/bigchef/
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenBiz Cubi Lite 3.0.8 SQL Injection via username Parameter
https://www.vulncheck.com/advisories/openbiz-cubi-lite-sql-injection-via-username-parameter

Scores

CVSS v3 8.2
EPSS 0.0038
EPSS Percentile 59.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-89
Status published
Products (1)
Sourceforge/OpenBiz Cubi Lite v3.0.8
Published Mar 26, 2026
Tracked Since Mar 26, 2026