FixVibe

// probes / spotlight

GeniXCMS Author SQL Injection Exposure

A legacy CMS author filter should not turn one parameter into SQL syntax.

Der Köder

Legacy PHP CMS installations often survive as marketing microsites, inherited blogs, and old customer portals. CVE-2017-5517 affects GeniXCMS through 0.0.8 when the author route's `type` parameter reaches SQL construction unsafely.

So funktioniert's

This active check confirms whether user-controlled input or workflow behavior crosses a security boundary. Public docs keep the explanation high-level so customers understand the risk. For check-specific questions about exact detection heuristics, active payload details, or source-code rule patterns, contact support@fixvibe.app.

Die Auswirkungen

A reachable affected route can expose database confidentiality, integrity, and availability depending on database privileges and surrounding controls. FixVibe reports this as a likely issue because it verifies SQL error behavior, but it does not extract records or prove full database compromise.

// what fixvibe checks

What FixVibe checks

FixVibe checks this class with verified-domain active testing that is bounded, non-destructive, and evidence-driven. Public reports describe the affected surface and remediation. For check-specific questions about exact detection heuristics, active payload details, or source-code rule patterns, contact support@fixvibe.app.

Wasserdichte Verteidigung

Upgrade GeniXCMS beyond 0.0.8 or apply the upstream author.control.php patch. During rollout, restrict public access to affected author routes and ensure the `type` filter is allowlisted and passed through parameterized database APIs.

// lass es auf deiner eigenen App laufen

Ship weiter, wÀhrend FixVibe mitwacht.

FixVibe testet die öffentliche OberflĂ€che deiner App so unter Druck, wie ein Angreifer es tun wĂŒrde — ohne Agent, ohne Installation, ohne Karte. Wir recherchieren laufend neue Schwachstellenmuster und machen daraus praktische Checks und kopierfertige Fixes fĂŒr Cursor, Claude und Copilot.

Aktive Probes
108
Tests in dieser Kategorie
Module
30
dedizierte aktive probes-PrĂŒfungen
pro Scan
397+
Tests ĂŒber alle Kategorien
  • Kostenlos — keine Karte, keine Installation, kein Slack-Ping
  • Einfach URL einfĂŒgen — wir crawlen, prĂŒfen und reporten
  • Findings nach Schweregrad sortiert, auf Signal dedupliziert
  • Aktuelle AI-fertige Fix-Prompts fĂŒr Cursor, Claude, Copilot
Kostenlosen Scan starten →

// aktuelle Checks · praktische Fixes · mit Vertrauen shippen

GeniXCMS Author SQL Injection Exposure — Vulnerability-Spotlight | FixVibe · FixVibe