No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Feb 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in jizhiCMS up to 2.5.6. Affected is the function findAll in the library frphp/lib/Model.php of the component Batch Interface. The manipulation of the argument data leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | jizhiCMS Batch Model.php findAll sql injection | |
| First Time appeared |
Jizhicms
Jizhicms jizhicms |
|
| Weaknesses | CWE-74 CWE-89 |
|
| CPEs | cpe:2.3:a:jizhicms:jizhicms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Jizhicms
Jizhicms jizhicms |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-27T05:02:06.427Z
Reserved: 2026-02-26T18:24:11.553Z
Link: CVE-2026-3292
No data.
Status : Received
Published: 2026-02-27T05:18:21.927
Modified: 2026-02-27T05:18:21.927
Link: CVE-2026-3292
No data.
OpenCVE Enrichment
No data.