CVE-2018-25182
Description
Silurus Classifieds Script 2.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the ID parameter. Attackers can send GET requests to wcategory.php with crafted SQL payloads in the ID parameter to extract database table names and sensitive information from the database.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Silurus Classifieds Script 2.0 is vulnerable to unauthenticated SQL injection via the ID parameter in wcategory.php, allowing attackers to extract database contents.
Vulnerability
Overview
CVE-2018-25182 describes an SQL injection vulnerability in Silurus Classifieds Script 2.0. The root cause is the lack of input sanitization on the ID parameter in wcategory.php. An attacker can inject arbitrary SQL queries by sending a crafted GET request to this endpoint, as demonstrated in the public exploit [1].
Exploitation
Details
No authentication is required to exploit this vulnerability. An attacker simply sends a GET request to wcategory.php with a malicious ID parameter containing a UNION-based SQL injection payload. The exploit proof-of-concept shows that the attacker can retrieve database table names and other sensitive information by manipulating the SQL query [1]. The attack is straightforward and can be executed remotely over HTTP.
Impact
Successful exploitation allows an unauthenticated attacker to execute arbitrary SQL queries against the underlying database. This can lead to the extraction of all database contents, including user credentials, personal data, and other sensitive information stored by the classifieds application. The impact is high, as it compromises the confidentiality and integrity of the entire database [1].
Mitigation
Status
As of the publication date, no official patch has been released for Silurus Classifieds Script 2.0. The software appears to be abandoned, with no updates from the vendor. Users are advised to migrate to a supported alternative or implement strict input validation and parameterized queries to mitigate the risk. The vulnerability is publicly documented and has a proof-of-concept exploit available [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: =2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.