CVE-2021-26599
Description
ImpressCMS before 1.4.3 allows include/findusers.php groups SQL Injection.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
ImpressCMS <= 1.4.3 suffers from a SQL injection in findusers.php, enabling admin account takeover via unauthenticated boolean-based and stacked queries.
Vulnerability
An SQL injection vulnerability exists in ImpressCMS versions 1.4.3 and earlier, located in the /include/findusers.php script. The groups POST parameter is passed unsanitized to the icms_member_Handler::getUserCountByGroupLink() and icms_member_Handler::getUsersByGroupLink() methods at lines 281 and 294, which use the input directly in SQL queries [1][4]. No special configuration or privileges are required to reach the vulnerable code path; the script is accessible to unauthenticated users.
Exploitation
A remote attacker can exploit this vulnerability by sending a crafted HTTP POST request to the /include/findusers.php endpoint with a malicious groups parameter. Because the application allows stacked SQL queries, the attacker can first inject a boolean-based payload to extract data (e.g., from the users table) or directly execute stacked statements to create a new administrative user [4]. No authentication or prior access is needed, and the attack does not require user interaction.
Impact
Successful exploitation leads to SQL injection with stacked query support. An attacker can read sensitive information from the users table (e.g., password hashes, email addresses) and, more critically, execute arbitrary SQL statements to create a new administrator account. This can ultimately result in full administrative control over the ImpressCMS site, enabling arbitrary PHP code execution and complete compromise of the CMS [4].
Mitigation
Version 1.4.4, released on 2022-03-09, fixes the vulnerability by properly sanitizing the groups input before use in SQL queries [3][4]. All users running ImpressCMS 1.4.3 or earlier should upgrade immediately to 1.4.4 or later. No workaround is available, as the vulnerable script is integral to the user management feature.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
impresscms/impresscmsPackagist | < 1.4.3 | 1.4.3 |
Affected products
2- ImpressCMS/ImpressCMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-jc4v-vvg6-xg78ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-26599ghsaADVISORY
- karmainsecurity.com/KIS-2022-04ghsax_refsource_MISCWEB
- packetstormsecurity.com/files/166404/ImpressCMS-1.4.2-SQL-Injection.htmlghsax_refsource_MISCWEB
- seclists.org/fulldisclosure/2022/Mar/46ghsax_refsource_MISCWEB
- github.com/ImpressCMS/impresscms/releases/tag/v1.4.3ghsaWEB
- hackerone.com/reports/1081145ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.