Key Information Affected Product Product Name: Complaint Management System Version: V2.0 Affected File: /admin/edit-subcategory.php Vulnerability Type Type: SQL Injection Root Cause In the file /admin/edit-subcategory.php, attackers can inject malicious code via the "subcategory" parameter. Due to the lack of proper input validation and filtering, attackers can directly inject malicious code into SQL queries. Impact Attackers can gain unauthorized access to the database, leading to data leakage, data tampering or deletion, and even service disruption. This poses a serious threat to the system's security and business continuity. Vulnerability Details and POC Vulnerability Location: "subcategory" parameter Payload: Request Packet: Recommended Remediation Measures 1. Use prepared statements and parameterized queries. 2. Validate and filter user input. 3. Minimize database user privileges.