CVE-2022-4984
Description
ZenTao Biz < 6.5, ZenTao Max < 3.0, ZenTao Open Source Edition < 16.5, and ZenTao Open Source Edition < 16.5.beta1 contain an SQL injection vulnerability in the login functionality. The application does not properly validate the account parameter on /zentao/user-login.html before using it in a database query. A remote unauthenticated attacker can exploit this issue to execute crafted SQL expressions and retrieve sensitive information from the backend database, including user and application data. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-07 UTC.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unauthenticated SQL injection in ZenTao login allows remote attackers to extract sensitive database contents.
CVE-2022-4984 is an SQL injection vulnerability affecting multiple ZenTao editions, including Biz < 6.5, Max < 3.0, and Open Source Edition < 16.5 (and < 16.5.beta1). The flaw resides in the /zentao/user-login.html endpoint, where the account parameter is not properly validated before being incorporated into a database query. This lack of sanitization enables an attacker to inject arbitrary SQL expressions during the login process [1].
Exploitation can be carried out by a remote, unauthenticated attacker. By sending specially crafted HTTP requests to the login page with malicious account values, the attacker can manipulate the underlying SQL query. No previous authentication or special network access is required, making the attack surface broad and easily reachable over the internet [1].
Successful exploitation allows an attacker to execute crafted SQL statements, leading to the retrieval of sensitive information from the backend database. This includes user credentials, application data, and other internal records. The Shadowserver Foundation observed exploitation activity on 2025-02-07 UTC, confirming that the vulnerability is actively being targeted [1].
Patches are available through the official ZenTao update channels. Users of affected versions should upgrade to ZenTao Biz 6.5 or later, ZenTao Max 3.0 or later, or ZenTao Open Source Edition 16.5 (or the latest stable release) to remediate the issue. Organizations should also review logs for signs of unauthorized access or data exfiltration [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.cnvd.org.cn/flaw/show/CNVD-2022-42853nvd
- www.vulncheck.com/advisories/zentao-biz-max-and-open-source-edition-sqli-via-user-loginnvd
- www.zentao.pm/download/zentao-community-edition-release-165-1170.htmlnvd
- www.zentao.pm/download/zentao-community-edition-release-1651-1143.htmlnvd
- www.zentao.pm/download/zentao-community-edition-release-30-1172.htmlnvd
- www.zentao.pm/download/zentao-community-edition-release-65-1171.htmlnvd
News mentions
0No linked articles in our index yet.