CVE-2025-70397
High
|7.2No Exploit
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to manipulate the database of jizhicms to delete articles or templates by sending specially crafted requests. To exploit this, the attacker needs access to the affected endpoints and must be able to send data to them.
Technical Description
jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the data parameter.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$1,421($1K-$5K)
Vendor Response
Grade APatched in 2 days
Quick Information
Published
Feb 17, 2026
about 2 months ago
Last Modified
Feb 19, 2026
about 2 months ago
Vendor
jizhicms
Product
jizhicms