VYPR
High severity8.2NVD Advisory· Published Mar 6, 2026· Updated Apr 15, 2026

CVE-2018-25188

CVE-2018-25188

Description

Webiness Inventory 2.3 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the order parameter. Attackers can send POST requests to the WsModelGrid.php endpoint with crafted SQL payloads to extract sensitive database information including usernames, databases, and version details.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Webiness Inventory 2.3 has an unauthenticated SQL injection in the order parameter of WsModelGrid.php, letting attackers extract sensitive data.

Root

Cause Webiness Inventory 2.3 is vulnerable to SQL injection in the order parameter of the WsModelGrid.php endpoint. The application fails to properly sanitize user input, allowing an attacker to inject arbitrary SQL code into database queries [1].

Exploitation

An unauthenticated attacker can send a crafted POST request to protected/library/ajax/WsModelGrid.php with a malicious order parameter. No authentication is required, making the attack surface broad [1]. The proof-of-concept payload demonstrates extracting the current database user, database name, and MySQL version via USER(), DATABASE(), and VERSION() functions, using CONCAT_WS and subqueries [1].

Impact

Successful exploitation allows an attacker to extract sensitive information such as usernames, database names, and version details. This can lead to further compromise of the compromise of other accounts or further attacks against the database [1]. The CVSS v3 score of 8.2 (High) reflects the ease of exploitation and the potential for data exposure.

Mitigation

The vendor has not released an official patch; the software appears to be no longer maintained. Administrators should consider removing or restricting access to the vulnerable endpoint, or migrating to an alternative inventory solution [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

50