{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7389","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-29T09:35:05.397Z","datePublished":"2026-04-29T15:30:18.641Z","dateUpdated":"2026-04-29T16:19:40.411Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-29T15:30:18.641Z"},"title":"EyouCMS common.php GetSortData sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"n/a","product":"EyouCMS","versions":[{"version":"1.7.0","status":"affected"},{"version":"1.7.1","status":"affected"},{"version":"1.7.2","status":"affected"},{"version":"1.7.3","status":"affected"},{"version":"1.7.4","status":"affected"},{"version":"1.7.5","status":"affected"},{"version":"1.7.6","status":"affected"},{"version":"1.7.7","status":"affected"},{"version":"1.7.8","status":"affected"},{"version":"1.7.9","status":"affected"}],"cpes":["cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in EyouCMS up to 1.7.9. The affected element is the function GetSortData of the file application/common.php. The manipulation of the argument sort_asc leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-29T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-29T11:40:16.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"anch0r (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB CNA Team","type":"coordinator"}],"references":[{"url":"https://vuldb.com/vuln/360114","name":"VDB-360114 | EyouCMS common.php GetSortData sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/360114/cti","name":"VDB-360114 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/803103","name":"Submit #803103 | eyoucms EyouCMS <=1.7.9 SQL Injection","tags":["third-party-advisory"]},{"url":"https://gitee.com/weng_xianhu/eyoucms/issues/IILFPE","tags":["exploit","issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-29T16:19:32.970291Z","id":"CVE-2026-7389","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-29T16:19:40.411Z"}}]}}