Saurus CMS Community Edition 4.7.1 contains a vulnerability in the custom DB::prepare() function, which uses preg_replace() with the deprecated /e (eval) modifier to interpolate SQL query parameters. This leads to injection of user-controlled SQL statements, potentially leading to arbitrary PHP code execution.
Metrics
Affected Vendors & Products
References
History
Thu, 21 Aug 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Saurus
Saurus saurus Cms |
|
Vendors & Products |
Saurus
Saurus saurus Cms |
Tue, 19 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-89 CWE-94 |
|
Metrics |
cvssV3_1
|
Tue, 19 Aug 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Saurus CMS Community Edition 4.7.1 contains a vulnerability in the custom DB::prepare() function, which uses preg_replace() with the deprecated /e (eval) modifier to interpolate SQL query parameters. This leads to injection of user-controlled SQL statements, potentially leading to arbitrary PHP code execution. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-08-19T00:00:00.000Z
Updated: 2025-08-19T14:01:15.942Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50567

Updated: 2025-08-19T13:59:18.560Z

Status : Awaiting Analysis
Published: 2025-08-19T14:15:39.700
Modified: 2025-08-20T14:40:17.713
Link: CVE-2025-50567

No data.