VYPR
High severity7.1NVD Advisory· Published Mar 6, 2026· Updated Apr 15, 2026

CVE-2018-25180

CVE-2018-25180

Description

Maitra 1.7.2 contains an sql injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the mailid parameter in outmail and inmail modules. Attackers can also download the SQLite database file directly from the application directory to extract sensitive mail tracking data and credentials.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Maitra 1.7.2 SQL injection in mailid parameter lets authenticated attackers execute arbitrary SQL and download the SQLite database, exposing sensitive data.

Vulnerability

Maitra 1.7.2 contains a SQL injection vulnerability in the mailid parameter of the outmail and inmail modules. The application fails to sanitize user input, allowing authenticated attackers to inject arbitrary SQL commands [1]. Additionally, the SQLite database file (maitra.sqlite) is stored in a publicly accessible directory (application/db/), enabling direct download without authentication [1].

Exploitation

An attacker with valid credentials can exploit the SQL injection by sending a crafted request to the mailid parameter. For example, a UNION-based injection retrieves database version and user data. The database file can be obtained via a simple GET request to /application/db/maitra.sqlite. The attack requires network access to the application's web interface [1].

Impact

Successful exploitation allows arbitrary SQL execution, leading to extraction of all data from the SQLite database, including mail tracking records and stored credentials. Direct database download provides a complete dump of the application's data. This can result in full compromise of the mail tracking system and exposure of sensitive information [2].

Mitigation

No official patch has been released for this version. Users should restrict network access to the application, ensure strong authentication, and consider moving the database file outside the web root or disabling the vulnerable modules if possible [1][2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.