FixVibe

// probes / spotlight

GeniXCMS Author SQL Injection Exposure

A legacy CMS author filter should not turn one parameter into SQL syntax.

The hook

Legacy PHP CMS installations often survive as marketing microsites, inherited blogs, and old customer portals. CVE-2017-5517 affects GeniXCMS through 0.0.8 when the author route's `type` parameter reaches SQL construction unsafely.

Necə işləyir

This active check confirms whether user-controlled input or workflow behavior crosses a security boundary. Public docs keep the explanation high-level so customers understand the risk. For check-specific questions about exact detection heuristics, active payload details, or source-code rule patterns, contact support@fixvibe.app.

The blast radius

A reachable affected route can expose database confidentiality, integrity, and availability depending on database privileges and surrounding controls. FixVibe reports this as a likely issue because it verifies SQL error behavior, but it does not extract records or prove full database compromise.

// what fixvibe checks

What FixVibe checks

FixVibe checks this class with verified-domain active testing that is bounded, non-destructive, and evidence-driven. Public reports describe the affected surface and remediation. For check-specific questions about exact detection heuristics, active payload details, or source-code rule patterns, contact support@fixvibe.app.

Ironclad defenses

Upgrade GeniXCMS beyond 0.0.8 or apply the upstream author.control.php patch. During rollout, restrict public access to affected author routes and ensure the `type` filter is allowlisted and passed through parameterized database APIs.

// run it on your own app

Keep shipping while FixVibe keeps watch.

FixVibe pressure-tests the public surface of your app the way an attacker would — no agent, no install, no card. We keep researching new vulnerability patterns and turn them into practical checks and paste-ready fixes for Cursor, Claude, and Copilot.

Aktiv zondlar
108
tests fired in this category
modules
30
dedicated aktiv zondlar checks
every scan
397+
tests across all categories
  • Free — no credit card, no install, no Slack ping
  • Just paste a URL — we crawl, probe, and report
  • Severity-graded findings, deduped to signal only
  • Current, AI-ready fix prompts you can paste into Cursor, Claude, Copilot
Run a free scan

// latest checks · practical fixes · ship with confidence

GeniXCMS Author SQL Injection Exposure — Vulnerability Spotlight | FixVibe · FixVibe