VYPR
High severity8.2NVD Advisory· Published Mar 6, 2026· Updated Apr 15, 2026

CVE-2018-25189

CVE-2018-25189

Description

Data Center Audit 2.6.2 contains an SQL injection vulnerability in the username parameter of dca_login.php that allows unauthenticated attackers to execute arbitrary SQL queries. Attackers can submit crafted SQL payloads through POST requests to extract sensitive database information including usernames, database names, and version details.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Data Center Audit 2.6.2 has an unauthenticated SQL injection in dca_login.php's username parameter, allowing attackers to extract sensitive database information.

Vulnerability

Overview

Data Center Audit 2. Audit 2.6.2 contains a SQL injection vulnerability exists in the username parameter of dca_login.php. The application fails to properly sanitize user input before including it in SQL queries, allowing an attacker to inject arbitrary SQL commands. This is a classic SQL injection flaw where the input is directly concatenated into a query without proper escaping or parameterization [1][2].

Exploitation

Details

The vulnerability can be exploited by sending a crafted POST request to the login page. No authentication is required, making it accessible to any remote attacker. The exploit payload shown in the public proof-of-concept uses a blind SQL injection technique that leverages error-based extraction to retrieve information. By injecting a subquery that causes a duplicate key error, the attacker can extract data such as the current database user, database name, and version [1]. The attack is performed over HTTP and does not require any special privileges or prior access.

Impact

Successful exploitation allows an unauthenticated attacker to execute arbitrary SQL queries against the underlying database. This can lead to the extraction of sensitive information, including usernames, database names, and database version details. Depending on the database configuration and permissions, the attacker might also be able to modify or delete data, potentially compromising the entire application and its data [2].

Mitigation

As of the publication date, the vendor has not released a patched version. Users of Data Center Audit 2.6.2 should consider upgrading to a newer version if available, or implement input validation and parameterized queries as a workaround. The vulnerability has been publicly disclosed and an exploit is available, increasing the risk of active exploitation [1][2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.