The provided text describes SQL injection vulnerabilities in 4xcms r26 due to insufficient input sanitization. It includes example payloads for exploitation but lacks executable code.
Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Theoretical
Target:4xcms r26
No auth needed
Prerequisites:Access to the login interface of 4xcms