Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sourceforge
Sourceforge openbiz Cubi Lite |
|
| Vendors & Products |
Sourceforge
Sourceforge openbiz Cubi Lite |
Thu, 26 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenBiz Cubi Lite 3.0.8 contains a SQL injection vulnerability in the login form that allows unauthenticated attackers to manipulate database queries through the username parameter. Attackers can submit POST requests to /bin/controller.php with malicious SQL code in the username field to extract sensitive database information or bypass authentication. | |
| Title | OpenBiz Cubi Lite 3.0.8 SQL Injection via username Parameter | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-26T18:25:23.772Z
Reserved: 2026-03-26T11:34:46.382Z
Link: CVE-2018-25209
Updated: 2026-03-26T18:19:07.145Z
Status : Awaiting Analysis
Published: 2026-03-26T12:16:06.257
Modified: 2026-03-26T15:13:15.790
Link: CVE-2018-25209
No data.
OpenCVE Enrichment
Updated: 2026-03-27T08:36:01Z