This exploit demonstrates a SQL injection vulnerability in Architectural CMS 1.0 via the forgot.php endpoint. The payload injects a malicious SQL query to extract database information, including usernames and passwords.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Architectural CMS 1.0
No auth needed
Prerequisites:Access to the target's forgot.php endpoint