VYPR
High severity8.2NVD Advisory· Published Mar 6, 2026· Updated Apr 15, 2026

CVE-2018-25172

CVE-2018-25172

Description

Pedidos 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'q' parameter. Attackers can send GET requests to the ajax/load_proveedores.php endpoint with crafted SQL payloads to extract sensitive database information including schema names and table structures.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Pedidos 1.0 contains an unauthenticated SQL injection vulnerability in the 'q' parameter of ajax/load_proveedores.php, allowing attackers to extract database schema and table structures.

Vulnerability

Details

Pedidos 1.0 is vulnerable to SQL injection in the ajax/load_proveedores.php endpoint. The q parameter is directly concatenated into SQL queries without sanitization, enabling unauthenticated attackers to inject arbitrary SQL commands [1]. The official description confirms that malicious code can be injected through this parameter.

Exploitation

An attacker can exploit this vulnerability by sending a crafted GET request to ajax/load_proveedores.php?q=[SQL]. No authentication is required. The proof-of-concept demonstrates a UNION-based injection that extracts database schema names using GROUP_CONCAT from INFORMATION_SCHEMA.SCHEMATA [1]. The payload is URL-encoded to bypass basic filters.

Impact

Successful exploitation allows an attacker to retrieve sensitive database information, including schema names and table structures. This can serve as a stepping stone for further attacks, such as extracting user credentials or other confidential data stored in the database.

Mitigation

As of the publication date, no official patch has been released for Pedidos 1.0. The software may be abandoned. Mitigation requires implementing input validation, using parameterized queries, or applying a web application firewall (WAF) to block malicious SQL patterns.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.