VYPR
High severity8.2NVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2018-25128

CVE-2018-25128

Description

SOCA Access Control System 180612 contains multiple SQL injection vulnerabilities that allow attackers to manipulate database queries through unvalidated POST parameters. Attackers can bypass authentication, retrieve password hashes, and gain administrative access with full system privileges by exploiting injection flaws in Login.php and Card_Edit_GetJson.php.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SOCA Access Control System 180612 contains multiple SQL injection flaws that allow unauthenticated attackers to bypass authentication and gain full admin access.

Vulnerability

Overview

The SOCA Access Control System version 180612 (and earlier versions 170000 and 141007) is affected by multiple SQL injection vulnerabilities [1][2]. The root cause is the failure to sanitize POST parameters in critical PHP endpoints, specifically Login.php and Card_Edit_GetJson.php. This allows an attacker to inject arbitrary SQL commands that the application then executes against the backend database [1].

Exploitation and

Attack Surface

An attacker can exploit these flaws without any prior authentication [2]. By crafting malicious POST requests to the vulnerable scripts, they can manipulate database queries. The attack can be performed remotely over the network, requiring only that the target system's web interface is accessible [1]. The official exploit-db entry provides a proof-of-concept demonstrating the injection technique [2].

Impact

Successful exploitation enables an attacker to bypass the login mechanism entirely, retrieve stored password hashes, and elevate privileges to administrative level [1][2]. Once an attacker gains admin access with full system privileges, they can control the access control system, modify cardholder data, and potentially lock out legitimate users or disable physical access controls.

Mitigation

SOCA Technology Co., Ltd. has not released a patched version for the affected software as of the disclosure dates [1][2]. Users are advised to isolate the management interface from untrusted networks, apply strict input validation as a workaround, or upgrade to a newer, supported version of the product if available.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.