Cyber Posture

CVE-2018-25183

HighPublic PoC

Published: 26 March 2026

Published
26 March 2026
Modified
27 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0049 65.5th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Shipping System CMS 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to bypass authentication by injecting SQL code through the username parameter. Attackers can submit malicious SQL payloads using boolean-based blind techniques in POST requests to the admin…

more

login endpoint to authenticate without valid credentials.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 mandates validation of inputs like the username parameter to block SQL injection payloads and prevent authentication bypass.

prevent

SI-2 requires timely identification, reporting, and correction of flaws such as this SQL injection vulnerability in the admin login endpoint.

detect

RA-5 employs vulnerability scanning to identify SQL injection flaws like CVE-2018-25183 in web applications.

Security SummaryAI

CVE-2018-25183 is an SQL injection vulnerability (CWE-89) in Shipping System CMS 1.0. The flaw resides in the admin login endpoint, where the username parameter in POST requests is vulnerable to SQL code injection, enabling attackers to manipulate database queries.

Unauthenticated attackers with network access can exploit this vulnerability remotely with low complexity and no user interaction required. By submitting malicious SQL payloads via boolean-based blind techniques, they can bypass authentication and gain unauthorized access to the admin panel without valid credentials. The CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N) reflects high confidentiality impact with low integrity impact and no availability disruption.

Advisories and related resources include an Exploit-DB entry at https://www.exploit-db.com/exploits/44722 detailing a proof-of-concept, a Vulncheck advisory at https://www.vulncheck.com/advisories/shipping-system-cms-sql-injection-via-admin-login, and a WeCodex item at https://www.wecodex.com/item/view/shipping-system-by-parcel-in-php-and-mysql/4 describing the software. No specific patches or mitigations are detailed in the provided information.

Details

CWE(s)

Affected Products

wecodex
shipping system cms
1.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in public-facing web application admin login enables remote unauthenticated exploitation for authentication bypass.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References