Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-8133 β€” AI Deep Analysis Summary

CVSS 7.3 Β· High

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Nature**: `admin.php` parameter order manipulation β†’ **SQL Injection** πŸ’₯ **Consequence**: Remote attackers can read/modify the database πŸ“‰ Causing information leakage or damage

Q2Root Cause? (CWE/Flaw)

πŸ” **Root Cause**: Parameter order manipulation ⚠️ Suspected **CWE-89**: SQL Injection πŸ“Œ Vulnerability Point: Unknown function in `dzz/shares/admin.php`

Q3Who is affected? (Versions/Components)

🎯 **Affected Versions**: zyx0814 FilePress ≀ **2.2.0** 🧩 **Affected Component**: Shares Filelist API ➑️ `admin.php`

Q4What can hackers do? (Privileges/Data)

πŸ‘€ **Privileges**: No login required πŸšͺ πŸ—ƒοΈ **Accessible Data**: Database content πŸ“‰ Risk: Data theft, tampering, or destruction

Q5Is exploitation threshold high? (Auth/Config)

βœ… **Low Exploitation Threshold** 🌐 **Remote** βœ”οΈ πŸ”“ **No Authentication Required** (PR:N / UI:N) βš™οΈ Triggerable with default configuration

Q6Is there a public Exp? (PoC/Wild Exploitation)

🧨 **Existing Exploit Available**! πŸ“‚ PoC on GitHub πŸ”— `Web-Security-Research/FilePress/Shares-API-PreAuth-SQLi` πŸ“’ Exploitation code is publicly available 🚨

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check Method**: - Check if using FilePress ≀ 2.2.0 ❗ - Locate `dzz/shares/admin.php` πŸ“ - Search for unfiltered parameter concatenation 🧡 - Test for abnormal responses using known requests πŸ§ͺ

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Officially Patched** βœ… πŸ“Œ Patch Hash: `e20ec58414103f781858f2951d178e19b1736664` πŸ”— GitHub commit & PR published πŸ”§

Q9What if no patch? (Workaround)

⚠️ **Before Patching**: - Restrict access to `admin.php` 🚧 IP whitelist - Disable Shares Filelist API ❌ - Use Web Application Firewall to block suspicious parameters 🧱

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **High Priority**! πŸ“ˆ CVSS: **6.3** (L/L/L) πŸ“’ Easy to exploit + Public Exploit βž• Remote Unauthenticated πŸ’‘ Recommendation: Apply patch immediately or implement temporary protection 🚨