CVE-2021-47956
Description
EgavilanMedia PHPCRUD 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the firstname parameter. Attackers can send POST requests to insert.php with malicious firstname values to extract sensitive database information.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
EgavilanMedia PHPCRUD 1.0 is vulnerable to unauthenticated SQL injection via the firstname parameter in insert.php, allowing database extraction.
Vulnerability
Overview
CVE-2021-47956 is an SQL injection vulnerability in EgavilanMedia PHPCRUD version 1.0. The application fails to properly sanitize user input passed to the firstname parameter in the insert.php endpoint. An attacker can inject arbitrary SQL commands by sending a crafted POST request, as the parameter is directly concatenated into database queries without proper neutralization [1][2].
Exploitation
The vulnerability is exploitable without authentication. An attacker only needs to send a POST request to insert.php with a malicious firstname value. The exploit can be performed using tools like Burp Suite to capture the request and modify the request, or with automated tools like sqlmap to automate the injection and data extraction. The attack vector is network-based, requiring no special privileges or user interaction [1].
Impact
Successful exploitation allows an unauthenticated attacker to extract sensitive information from the underlying database, including user credentials, personal data, or other confidential records. The CVSS v3.1 base score is 8.2 (High), with the vector indicating high confidentiality impact, low integrity impact, and no availability impact [2].
Mitigation
As of the advisory publication, no patch has been released for PHPCRUD 1.0. Users are advised to apply input validation and parameterized queries to mitigate the risk, or consider migrating to an alternative solution if the software is no longer maintained [1][2].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.