Cyber Posture

CVE-2024-58308

CriticalPublic PoC

Published: 11 December 2025

Published
11 December 2025
Modified
31 December 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0033 56.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Quick.CMS 6.7 contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login authentication by manipulating the login form. Attackers can inject specific SQL payloads like ' or '1'='1 to gain unauthorized administrative access to the system.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates login form inputs to block malicious SQL payloads like ' or '1'='1', preventing authentication bypass via SQL injection.

prevent

Restricts login form inputs to whitelisted characters and lengths, blocking SQL injection payloads in the Quick.CMS administrative login.

prevent

Remediates the specific SQL injection flaw in Quick.CMS 6.7 login form through timely patching and flaw correction.

Security SummaryAI

CVE-2024-58308 is a SQL injection vulnerability in Quick.CMS version 6.7, affecting the login form in the administrative interface. The flaw, classified under CWE-89, enables attackers to manipulate SQL queries during authentication attempts. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and lack of prerequisites.

Unauthenticated remote attackers can exploit this vulnerability by submitting malicious payloads, such as ' or '1'='1, directly into the login form fields. Successful exploitation bypasses authentication entirely, granting unauthorized administrative access to the Quick.CMS system. This access could allow attackers to execute arbitrary SQL commands, potentially leading to full compromise including data exfiltration, modification, or deletion.

Advisories and references, including those from VulnCheck and Exploit-DB, detail the authentication bypass via the admin login SQL injection. An exploit is publicly available at Exploit-DB (ID 51910). The vendor's site at opensolution.org provides downloads for Quick.CMS 6.7, but no specific patch details are outlined in the provided information; practitioners should verify updates directly from the vendor.

An exploit proof-of-concept is available on Exploit-DB, indicating potential for real-world abuse against unpatched Quick.CMS 6.7 installations.

Details

CWE(s)

Affected Products

opensolution
quick cms
6.7

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in the public-facing admin login form enables unauthenticated remote exploitation of a public-facing web application (T1190) for authentication bypass and arbitrary SQL execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References