SQL injection (SQLi) in MegaCMS v12.0.0, specifically in the “id_territorio” parameter of the “/web_comunications/cms/get_provincias” endpoint. The vulnerability arises from inadequate validation and sanitisation of user input. Specifically, via a POST request, the “id_territorio” parameter, used immediately after the registration form is submitted, could be manipulated by an unauthenticated attacker to execute arbitrary SQL queries.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
Update to the latest available version.
Workaround
No workaround given by the vendor.
References
History
Wed, 29 Apr 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SQL injection (SQLi) in MegaCMS v12.0.0, specifically in the “id_territorio” parameter of the “/web_comunications/cms/get_provincias” endpoint. The vulnerability arises from inadequate validation and sanitisation of user input. Specifically, via a POST request, the “id_territorio” parameter, used immediately after the registration form is submitted, could be manipulated by an unauthenticated attacker to execute arbitrary SQL queries. | |
| Title | SQL injection in MegaCMS by CRM Sistemas de Fidelización | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-04-29T08:37:32.529Z
Reserved: 2026-02-27T13:20:09.388Z
Link: CVE-2026-3325
No data.
Status : Received
Published: 2026-04-29T09:16:24.130
Modified: 2026-04-29T09:16:24.130
Link: CVE-2026-3325
No data.
OpenCVE Enrichment
Updated: 2026-04-29T10:30:08Z
Weaknesses