VYPR
Medium severity6.5NVD Advisory· Published Feb 11, 2025· Updated Apr 15, 2026

CVE-2024-55212

CVE-2024-55212

Description

DNNGo xBlog v6.5.0 was discovered to contain a SQL injection vulnerability via the Categorys parameter at /DNNGo_xBlog/Resource_Service.aspx.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated blind SQL injection vulnerability in DNNGo xBlog v6.5.0 allows attackers to extract database data via the Categorys parameter.

Vulnerability

Overview

CVE-2024-55212 is a blind SQL injection vulnerability discovered in the DNNGo xBlog plugin version 6.5.0 for DNN (DotNetNuke). The issue resides in the Categorys parameter of the /DNNGo_xBlog/Resource_Service.aspx endpoint. The root cause is the lack of proper input sanitization or parameterized queries when handling user-supplied data in HTTP GET requests, allowing malicious SQL statements to be executed against the underlying MSSQL database [1].

Exploitation

Details

This vulnerability is exploitable without authentication and requires no prior knowledge of the target, as the vulnerable endpoint is publicly accessible. Attackers can send crafted HTTP GET requests containing blind SQL injection payloads through the Categorys parameter. A blind SQLi technique is used because the response does not directly return query results; instead, the attacker infers information by observing differences in HTTP responses (e.g., status codes, timing delays) to determine whether a condition was true or false [1].

Impact

Successful exploitation allows an unauthenticated attacker to extract sensitive information from the database, such as user credentials, application data, or configuration details. The attack is limited to data retrieval (read access) and does not appear to enable data modification or command execution based on available information.

Mitigation

As of the publication date, no official patch has been released by DNNGo. Users are advised to apply input validation and parameterized queries as a workaround. The vulnerability is not yet listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, but given the ease of exploitation, administrators should prioritize mitigation.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.