CVE-2018-25180
Description
Maitra 1.7.2 contains an sql injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the mailid parameter in outmail and inmail modules. Attackers can also download the SQLite database file directly from the application directory to extract sensitive mail tracking data and credentials.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Maitra 1.7.2 SQL injection in mailid parameter lets authenticated attackers execute arbitrary SQL and download the SQLite database, exposing sensitive data.
Vulnerability
Maitra 1.7.2 contains a SQL injection vulnerability in the mailid parameter of the outmail and inmail modules. The application fails to sanitize user input, allowing authenticated attackers to inject arbitrary SQL commands [1]. Additionally, the SQLite database file (maitra.sqlite) is stored in a publicly accessible directory (application/db/), enabling direct download without authentication [1].
Exploitation
An attacker with valid credentials can exploit the SQL injection by sending a crafted request to the mailid parameter. For example, a UNION-based injection retrieves database version and user data. The database file can be obtained via a simple GET request to /application/db/maitra.sqlite. The attack requires network access to the application's web interface [1].
Impact
Successful exploitation allows arbitrary SQL execution, leading to extraction of all data from the SQLite database, including mail tracking records and stored credentials. Direct database download provides a complete dump of the application's data. This can result in full compromise of the mail tracking system and exposure of sensitive information [2].
Mitigation
No official patch has been released for this version. Users should restrict network access to the application, ensure strong authentication, and consider moving the database file outside the web root or disabling the vulnerable modules if possible [1][2].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.