Critical severity9.8NVD Advisory· Published Nov 11, 2016· Updated May 6, 2026
CVE-2016-9288
CVE-2016-9288
Description
In framework/modules/navigation/controllers/navigationController.php in Exponent CMS v2.4.0 or older, the parameter "target" of function "DragnDropReRank" is directly used without any filtration which caused SQL injection. The payload can be used like this: /navigation/DragnDropReRank/target/1.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/exponentcms/exponent-cms/commit/2ddffb2e7eafe4830e3483a4b437873022c461banvdIssue TrackingPatch
- www.securityfocus.com/bid/94296nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1037280nvd
News mentions
0No linked articles in our index yet.