High severity7.5NVD Advisory· Published Nov 4, 2016· Updated May 6, 2026
CVE-2016-9184
CVE-2016-9184
Description
In /framework/modules/core/controllers/expHTMLEditorController.php of Exponent CMS 2.4.0, untrusted input is used to construct a table name, and in the selectObject method in mysqli class, table names are wrapped with a character that common filters do not filter, allowing for SQL Injection. Impact is Information Disclosure.
Affected products
1- cpe:2.3:a:exponentcms:exponent_cms:2.4.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/exponentcms/exponent-cms/commit/0ce8b94d745b818bd207933d9a2e7f32587c2c89nvdIssue TrackingPatchThird Party Advisory
- www.securityfocus.com/bid/94227nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.