Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 04 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 01 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Siteserver
Siteserver sscms |
|
| Vendors & Products |
Siteserver
Siteserver sscms |
Thu, 30 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SSCMS v7.4.0 contains a SQL injection vulnerability in the stl:sqlContent tag where the queryString attribute is passed directly to database execution without parameterization or sanitization. Attackers can craft encrypted payloads submitted to the /api/stl/actions/dynamic endpoint to execute arbitrary SQL statements, leading to unauthorized database access, data disclosure, authentication bypass, data modification, or complete database compromise. | |
| Title | SSCMS v7.4.0 SQL Injection via stl:sqlContent queryString | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-04T13:24:44.833Z
Reserved: 2026-04-29T15:22:42.018Z
Link: CVE-2026-7435
Updated: 2026-05-04T13:24:32.923Z
Status : Deferred
Published: 2026-04-30T21:16:34.100
Modified: 2026-05-04T14:16:36.650
Link: CVE-2026-7435
No data.
OpenCVE Enrichment
Updated: 2026-05-02T00:30:16Z