High severity7.5NVD Advisory· Published Nov 4, 2016· Updated May 6, 2026
CVE-2016-9183
CVE-2016-9183
Description
In /framework/modules/ecommerce/controllers/orderController.php of Exponent CMS 2.4.0, untrusted input is passed into selectObjectsBySql. The method selectObjectsBySql of class mysqli_database uses the injectProof method to prevent SQL injection, but this filter can be bypassed easily: it only sanitizes user input if there are odd numbers of ' or " characters. Impact is Information Disclosure.
Affected products
1- cpe:2.3:a:exponentcms:exponent_cms:2.4.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/exponentcms/exponent-cms/commit/3b3557e9f6ba193a4c23c8ce5498fa285dddf3f3nvdIssue TrackingPatchThird Party Advisory
- www.securityfocus.com/bid/94227nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.