VYPR
High severity8.2NVD Advisory· Published Mar 6, 2026· Updated Apr 15, 2026

CVE-2018-25182

CVE-2018-25182

Description

Silurus Classifieds Script 2.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the ID parameter. Attackers can send GET requests to wcategory.php with crafted SQL payloads in the ID parameter to extract database table names and sensitive information from the database.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Silurus Classifieds Script 2.0 is vulnerable to unauthenticated SQL injection via the ID parameter in wcategory.php, allowing attackers to extract database contents.

Vulnerability

Overview

CVE-2018-25182 describes an SQL injection vulnerability in Silurus Classifieds Script 2.0. The root cause is the lack of input sanitization on the ID parameter in wcategory.php. An attacker can inject arbitrary SQL queries by sending a crafted GET request to this endpoint, as demonstrated in the public exploit [1].

Exploitation

Details

No authentication is required to exploit this vulnerability. An attacker simply sends a GET request to wcategory.php with a malicious ID parameter containing a UNION-based SQL injection payload. The exploit proof-of-concept shows that the attacker can retrieve database table names and other sensitive information by manipulating the SQL query [1]. The attack is straightforward and can be executed remotely over HTTP.

Impact

Successful exploitation allows an unauthenticated attacker to execute arbitrary SQL queries against the underlying database. This can lead to the extraction of all database contents, including user credentials, personal data, and other sensitive information stored by the classifieds application. The impact is high, as it compromises the confidentiality and integrity of the entire database [1].

Mitigation

Status

As of the publication date, no official patch has been released for Silurus Classifieds Script 2.0. The software appears to be abandoned, with no updates from the vendor. Users are advised to migrate to a supported alternative or implement strict input validation and parameterized queries to mitigate the risk. The vulnerability is publicly documented and has a proof-of-concept exploit available [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.