SQL injection (SQLi) in MegaCMS v12.0.0, specifically in the “id_territorio” parameter of the “/web_comunications/cms/get_provincias” endpoint. The vulnerability arises from inadequate validation and sanitisation of user input. Specifically, via a POST request, the “id_territorio” parameter, used immediately after the registration form is submitted, could be manipulated by an unauthenticated attacker to execute arbitrary SQL queries.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
Update to the latest available version.
Workaround
No workaround given by the vendor.
References
History
Wed, 29 Apr 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SQL injection (SQLi) in MegaCMS v12.0.0, specifically in the “id_territorio” parameter of the “/web_comunications/cms/get_provincias” endpoint. The vulnerability arises from inadequate validation and sanitisation of user input. Specifically, via a POST request, the “id_territorio” parameter, used immediately after the registration form is submitted, could be manipulated by an unauthenticated attacker to execute arbitrary SQL queries. | |
| Title | SQL injection in MegaCMS by CRM Sistemas de Fidelización | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-04-29T08:37:32.529Z
Reserved: 2026-02-27T13:20:09.388Z
Link: CVE-2026-3325
No data.
Status : Received
Published: 2026-04-29T09:16:24.130
Modified: 2026-04-29T09:16:24.130
Link: CVE-2026-3325
No data.
OpenCVE Enrichment
Updated: 2026-04-29T10:30:08Z
Weaknesses