CVE-2025-70397

High
|7.2
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to manipulate the database of jizhicms to delete articles or templates by sending specially crafted requests. To exploit this, the attacker needs access to the affected endpoints and must be able to send data to them.

Technical Description

jizhicms 2.5.6 is vulnerable to SQL Injection in Article/deleteAll and Extmolds/deleteAll via the data parameter.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$1,421($1K-$5K)
Vendor Response
Grade APatched in 2 days

Quick Information

Published

Feb 17, 2026

about 2 months ago

Last Modified

Feb 19, 2026

about 2 months ago

Vendor

jizhicms

Product

jizhicms