This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: FUEL CMS 1.4.1 suffers from **SQL Injection** in the `filter` (pages/select/) and `data` (preview/) parameters.β¦
π¦ **Affected**: **FUEL CMS version 1.4.1**. <br>βοΈ **Component**: Specifically the `pages/select/` and `preview/` pages. <br>π’ **Vendor**: Information not explicitly listed in data, but product is FUEL CMS.
π **Threshold**: **LOW**. <br>π **Auth**: **None required**. The exploit works without any authentication credentials. <br>βοΈ **Config**: Standard installation of v1.4.1 is vulnerable.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exp**: **YES**. <br>π **Availability**: Multiple PoCs exist on GitHub (Python 3, Rust implementations) and Exploit-DB (ID 47138). <br>β οΈ **Status**: Actively exploitable in the wild.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: <br>1. **Scan**: Use tools targeting FUEL CMS SQLi. <br>2. **Verify**: Check if the site runs **FUEL CMS 1.4.1**. <br>3. **Test**: Attempt injection in `pages/select/?filter=` or `preview/?β¦
π₯ **Urgency**: **CRITICAL**. <br>β±οΈ **Priority**: **Immediate Action Required**. <br>π **Risk**: Pre-Auth RCE means any internet-facing FUEL CMS 1.4.1 instance is at high risk of total compromise. Do not delay patching.