This issue was fixed in 6.30@A04.4_u06.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Simple Sa
Simple Sa simple.erp |
|
| Vendors & Products |
Simple Sa
Simple Sa simple.erp |
Thu, 26 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Feb 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SIMPLE.ERP is vulnerable to the SQL Injection in search functionality in "Obroty na kontach" window. Lack of input validation allows an authenticated attacker to prepare a malicious query to the database that will be executed. This issue was fixed in 6.30@A04.4_u06. | |
| Title | SQL Injection in SIMPLE.ERP | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-02-26T14:27:02.779Z
Reserved: 2026-01-19T14:01:03.414Z
Link: CVE-2026-1198
Updated: 2026-02-26T14:23:09.548Z
Status : Deferred
Published: 2026-02-26T12:15:58.550
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-1198
No data.
OpenCVE Enrichment
Updated: 2026-04-17T14:30:20Z