CVE-2018-25172
SQL Injection in Pedidos 1.0 ajax/load_proveedores.php Endpoint
Publication date: 2026-03-06
Last updated on: 2026-03-06
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "Pedidos 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'q' parameter."}, {'type': 'paragraph', 'content': 'Attackers can send specially crafted GET requests to the ajax/load_proveedores.php endpoint, manipulating the SQL query to extract sensitive database information such as schema names and table structures.'}] [1]
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': 'This vulnerability can lead to unauthorized access to sensitive database information, including the structure and contents of the database.'}, {'type': 'paragraph', 'content': "Attackers can exploit this flaw to retrieve confidential data, potentially compromising the integrity and confidentiality of your system's data."}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': "This SQL injection vulnerability can be detected by sending crafted GET requests to the ajax/load_proveedores.php endpoint with malicious SQL payloads in the 'q' parameter and observing the response for database information leakage."}, {'type': 'paragraph', 'content': 'For example, a command using curl to test the vulnerability might look like this:'}, {'type': 'list_item', 'content': 'curl "http://targetsite/ajax/load_proveedores.php?q=\' UNION SELECT schema_name,2,3 FROM INFORMATION_SCHEMA.SCHEMATA--"'}, {'type': 'paragraph', 'content': 'If the response contains database schema names or other unexpected data, it indicates the presence of the SQL injection vulnerability.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
I don't know