VYPR
High severity7.3NVD Advisory· Published May 11, 2026· Updated May 12, 2026

CVE-2026-36962

CVE-2026-36962

Description

SQL Injection in MuuCMF T6 v1.9.4.20260115 allows an unauthenticated attacker to compromise the entire database, achieve unauthorized administrative access, and potentially gain remote code execution by writing malicious files to the server's file system via the keyword parameter in the /index/controller/Search.php endpoint.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unauthenticated SQL injection in MuuCMF T6 v1.9.4.20260115 via the keyword parameter enables database compromise, admin access, and can lead to RCE via file write.

Vulnerability

Analysis

MuuCMF T6 v1.9.4.20260115 contains an SQL injection vulnerability in the /index/controller/Search.php endpoint. The getListByPage() function in app/common/model/Base.php uses whereRaw() when the $map parameter is not an array, allowing raw SQL clauses to be injected. The search controller passes user-supplied keyword input directly into this function without proper sanitization, only trimming whitespace and splitting on spaces, which enables an attacker to append malicious SQL commands [1].

An unauthenticated attacker can exploit this by sending a crafted HTTP request to /index/Search/index.html?keyword= request. No authentication or special network position is required; the vulnerable endpoint is publicly accessible. The injection occurs via the keyword parameter, which is processed by the getListByPage() function that constructs the WHERE clause using user input, bypassing the parameterized query path taken when $map is an array [1].

Impact is severe: an attacker can extract the entire database, including user credentials and administrative tokens, potentially achieving unauthorized administrative access. Critically, depending on the MySQL server configuration (specifically secure_file_priv), the attacker can write a web shell to the server's file system, gaining remote code execution (RCE) on the underlying host [1].

As of the disclosed information, the vulnerability exists in version 1.9.4.20260115 and was also confirmed in a later version 1.9.5.20260309. Users should apply any available patches or consider upgrading to a fixed version. Until a patch is available, strict input validation and disabling the use of whereRaw with user-controllable data are recommended mitigation measures [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.