FixVibe

// sondeos / spotlight

GeniXCMS Author SQL Injection Exposure

A legacy CMS author filter should not turn one parameter into SQL syntax.

El gancho

Legacy PHP CMS installations often survive as marketing microsites, inherited blogs, and old customer portals. CVE-2017-5517 affects GeniXCMS through 0.0.8 when the author route's `type` parameter reaches SQL construction unsafely.

Cómo funciona

This active check confirms whether user-controlled input or workflow behavior crosses a security boundary. Public docs keep the explanation high-level so customers understand the risk. For check-specific questions about exact detection heuristics, active payload details, or source-code rule patterns, contact support@fixvibe.app.

El radio de impacto

A reachable affected route can expose database confidentiality, integrity, and availability depending on database privileges and surrounding controls. FixVibe reports this as a likely issue because it verifies SQL error behavior, but it does not extract records or prove full database compromise.

// what fixvibe checks

What FixVibe checks

FixVibe checks this class with verified-domain active testing that is bounded, non-destructive, and evidence-driven. Public reports describe the affected surface and remediation. For check-specific questions about exact detection heuristics, active payload details, or source-code rule patterns, contact support@fixvibe.app.

Defensas a prueba de balas

Upgrade GeniXCMS beyond 0.0.8 or apply the upstream author.control.php patch. During rollout, restrict public access to affected author routes and ensure the `type` filter is allowlisted and passed through parameterized database APIs.

// ejecútalo en tu propia app

Sigue lanzando mientras FixVibe vigila.

FixVibe somete la superficie pública de tu app a la misma presión que un atacante — sin agente, sin instalación, sin tarjeta. Seguimos investigando nuevos patrones de vulnerabilidad y los convertimos en checks prácticos y fixes listos para Cursor, Claude y Copilot.

Sondeos activos
108
tests en esta categoría
módulos
30
checks dedicados de sondeos activos
cada scan
397+
tests en todas las categorías
  • Gratis — sin tarjeta, sin instalación, sin ping de Slack
  • Solo pega una URL — nosotros crawleamos, sondeamos y reportamos
  • Hallazgos clasificados por severidad, deduplicados al puro signal
  • Prompts de fix actuales, listos para Cursor, Claude, Copilot
Ejecutar un escaneo gratis

// checks actuales · fixes prácticos · lanza con confianza

GeniXCMS Author SQL Injection Exposure — Spotlight de Vulnerabilidad | FixVibe · FixVibe