{"id":45843,"date":"2022-03-23T15:59:26","date_gmt":"2022-03-23T15:59:26","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33248\/ImpressCMS-From-Unauthenticated-SQL-Injection-To-RCE.html"},"modified":"2022-03-23T15:59:26","modified_gmt":"2022-03-23T15:59:26","slug":"impresscms-from-unauthenticated-sql-injection-to-rce","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/","title":{"rendered":"ImpressCMS: From Unauthenticated SQL Injection To RCE"},"content":{"rendered":"<p>According to <a class=\"post\" href=\"https:\/\/www.impresscms.org\" target=\"_blank\" rel=\"noopener\">the official website<\/a> ImpressCMS is an open source Content Management System (CMS) designed to easily and securely manage multilingual web sites. With this tool maintaining the content of a website becomes as easy as writing a word document. ImpressCMS is the ideal tool for a wide range of users: from business to community users, from large enterprises to people who want a simple, easy to use blogging tool. ImpressCMS is a powerful system that gets outstanding results and it is free!<br \/>The application comes with a built-in security module \u2013 <a class=\"post\" href=\"https:\/\/www.impresscms.org\/modules\/simplywiki\/index.php?page=Protector\" target=\"_blank\" rel=\"noopener\">Protector<\/a> \u2013 which is designed to improve the overall security of ImpressCMS websites and prevent certain web attacks such as Cross-Site Scripting (XSS) and SQL Injection. In this blog post we will see how to bypass such a security mechanism to exploit a couple vulnerabilities I discovered about a year ago, which might eventually allow unauthenticated attackers to execute arbitrary PHP code on the web server (<a class=\"post\" href=\"https:\/\/en.wikipedia.org\/wiki\/Arbitrary_code_execution\" target=\"_blank\" rel=\"noopener\">RCE<\/a>)\u2026<span id=\"more-119\"><\/span><\/p>\n<p class=\"big-caption\">\u2022 Vulnerabilities analysis:<\/p>\n<p>Let\u2019s start to analyze the two vulnerabilities which can be exploited in tandem to bypass access control (<a class=\"post\" href=\"http:\/\/karmainsecurity.com\/KIS-2022-03\" target=\"_blank\" rel=\"noopener\">KIS-2022-03<\/a>) and reach a script vulnerable to SQL Injection (<a class=\"post\" href=\"http:\/\/karmainsecurity.com\/KIS-2022-04\" target=\"_blank\" rel=\"noopener\">KIS-2022-04<\/a>). Both of them are located in the <b><i>\/include\/findusers.php<\/i><\/b> script, which is intended to be used by authenticated users to search for other users. However, due to the following vulnerable lines of code, it can be accessed by unauthenticated attackers as well:<\/p>\n<pre class=\"brush: php; first-line: 16; notranslate\">\ninclude \"..\/mainfile.php\";\nxoops_header(false); $denied = true;\nif (!empty($_REQUEST['token'])) { if (icms::$security-&gt;validateToken($_REQUEST['token'], false)) { $denied = false; }\n} elseif (is_object(icms::$user) &amp;&amp; icms::$user-&gt;isAdmin()) { $denied = false;\n}\nif ($denied) { icms_core_Message::error(_NOPERM); exit();\n}\n<\/pre>\n<p>The \u201celseif\u201d statement at lines 24-26 will check whether the user is currently authenticated and they have administrator privileges, if so it will grant access to the script functionalities. While the \u201cif\u201d statement at lines 20-23 will do the same by solely checking the provided security token, without verifying whether the user is currently authenticated or not. This means that if an attacker provides a valid security token, then they will get unauthorized access to the script. Such security tokens will be generated in several places within the application \u2013 just grep the code searching the string <code>icms::$security-&gt;getTokenHTML()<\/code> \u2013 and some of them do not require the user to be authenticated, like the <b><i>misc.php<\/i><\/b> script, <a class=\"post\" href=\"https:\/\/github.com\/ImpressCMS\/impresscms\/blob\/48af29c6b8150fbf4220bb5cc4f3c57bcd818384\/misc.php#L181\" target=\"_blank\" rel=\"noopener\">here<\/a> at line 181.<\/p>\n<p>Moving forward to some lines later we can see the following:<\/p>\n<pre class=\"brush: php; first-line: 281; highlight:[281,294]; notranslate\"> $total = $user_handler-&gt;getUserCountByGroupLink(@$_POST[\"groups\"], $criteria); $validsort = array(\"uname\", \"email\", \"last_login\", \"user_regdate\", \"posts\"); $sort = (!in_array($_POST['user_sort'], $validsort)) ? \"uname\" : $_POST['user_sort']; $order = \"ASC\"; if (isset($_POST['user_order']) &amp;&amp; $_POST['user_order'] == \"DESC\") { $order = \"DESC\"; } $criteria-&gt;setSort($sort); $criteria-&gt;setOrder($order); $criteria-&gt;setLimit($limit); $criteria-&gt;setStart($start); $foundusers = $user_handler-&gt;getUsersByGroupLink(@$_POST[\"groups\"], $criteria, TRUE);\n<\/pre>\n<p>At lines 281 and 294 the \u201cgroups\u201d POST parameter is being used in a call to the <code>getUserCountByGroupLink()<\/code> and <code>getUsersByGroupLink()<\/code> methods from the <code>icms_member_Handler<\/code> class, and both of them use the first argument to construct an SQL query without proper validation (assuming it is an array of integers), as shown in the following code snippet:<\/p>\n<pre class=\"brush: php; first-line: 512; highlight: 520; notranslate\"> public function getUserCountByGroupLink($groups, $criteria = null) { $ret = 0; $sql[] = \"\tSELECT COUNT(DISTINCT u.uid) \" . \"\tFROM \" . icms::$xoopsDB-&gt;prefix(\"users\") . \" AS u\" . \" LEFT JOIN \" . icms::$xoopsDB-&gt;prefix(\"groups_users_link\") . \" AS m ON m.uid = u.uid\" . \"\tWHERE 1 = '1'\"; if (! empty($groups)) { $sql[] = \"m.groupid IN (\" . implode(\", \", $groups) . \")\"; } if (isset($criteria) &amp;&amp; is_subclass_of($criteria, 'icms_db_criteria_Element')) { $sql[] = $criteria-&gt;render(); } $sql_string = implode(\" AND \", array_filter($sql)); if (! $result = icms::$xoopsDB-&gt;query($sql_string)) { return $ret; } list($ret) = icms::$xoopsDB-&gt;fetchRow($result); return $ret; }\n<\/pre>\n<p>To sum up, a remote unauthenticated attacker might be able to manipulate the executed SQL queries, and this could be exploited to e.g. read sensitive data from the \u201cusers\u201d database table through boolean-based SQL Injection attacks, without the knowledge of the tables prefix (which is randomly generated during the installation). This is possible by injecting a payload like this:<\/p>\n<blockquote>\n<p>\n1) AND ORD(SUBSTR(u.pass,1,1)) = XX #\n<\/p>\n<\/blockquote>\n<p>At a first glance, this seems to be a quite limited vulnerability: first of all, users\u2019 passwords are hashed with \u201csalting\u201d, so they cannot be cracked without first disclosing the salt; another option would be leaking the admin\u2019s email address and attack the password reset mechanism, but this won\u2019t do the trick, because a random password will be generated and emailed to the user\u2026 So, here comes the question: is it possible to leverage these vulnerabilities to login into ImpressCMS as admin and escalate the attack to an RCE? And the answer is: yesss! However, we have to deal with the Protector module\u2026<\/p>\n<p class=\"big-caption\">\u2022 Exploitation:<\/p>\n<p>In a nutshell, without going deeper into the details, the anti SQL Injection measures provided by the Protector module check for suspicious strings within the request parameters, such as <code>select<\/code>, <code>concat<\/code>, or <code>information_schema<\/code>, and if they are found then the request will be blocked and the event will be logged. As such, we can\u2019t use something like <code>UNION SELECT...<\/code> to complete the query and fetch data from an arbitrary table. On the other hand, ImpressCMS uses <a class=\"post\" href=\"https:\/\/www.php.net\/manual\/en\/ref.pdo-mysql.php\" target=\"_blank\" rel=\"noopener\">PDO<\/a> as a database driver, which allows for stacked SQL queries separated by a semicolon. So, we can inject something like this:<\/p>\n<blockquote>\n<p>\n0); INSERT INTO i36fd6f18_users (uname, pass) VALUES (0\u00d765676978, 0\u00d732333964\u2026) #\n<\/p>\n<\/blockquote>\n<p>This will create a new record into the \u201cusers\u201d database table, allowing an attacker to login as an ImpressCMS administrator, which would mean game over! However, in order to do that, the attacker should first guess the database tables prefix\u2026 And this could be achieved again with a boolean-based SQL Injection attack, by injecting something like the following:<\/p>\n<blockquote>\n<p>\n1) AND ORD(SUBSTR((SELECT table_name FROM information_schema.tables WHERE table_schema=\u2019impresscms\u2019 AND table_name LIKE \u2018%users\u2019), 1, 1)) = XX #\n<\/p>\n<\/blockquote>\n<p>Unfortunately, this one will get blocked by the Protector module because it contains suspicious SQL strings, so we need to find another way\u2026 And here it comes: since stacked queries are allowed, an attacker might be able to bypass the Protector module by assigning to a variable the hex representation of the query they want to execute (by using <a class=\"post\" href=\"https:\/\/dev.mysql.com\/doc\/refman\/5.7\/en\/set-variable.html\" target=\"_blank\" rel=\"noopener\">SET<\/a>), and then use the <a class=\"post\" href=\"https:\/\/dev.mysql.com\/doc\/refman\/8.0\/en\/prepare.html\" target=\"_blank\" rel=\"noopener\">PREPARE<\/a> and <a class=\"post\" href=\"https:\/\/dev.mysql.com\/doc\/refman\/8.0\/en\/execute.html\" target=\"_blank\" rel=\"noopener\">EXECUTE<\/a> MySQL statements to ultimately execute the query. This means we should inject something like this:<\/p>\n<blockquote>\n<p>\n0);<br \/>SET @q = 0x53454c45435420534c454550283129;<br \/>PREPARE stmt FROM @q;<br \/>EXECUTE stmt; #\n<\/p>\n<\/blockquote>\n<p>This one will not be catched by the Protector module, because the \u201csuspicious strings\u201d are hex-encoded! At this point we have all the pieces to put together the puzzle, and here are all the steps to get from unauthenticated SQL injection to RCE:<\/p>\n<ul>\n<li>Retrieve a valid security token from <code>\/misc.php?action=showpopups&amp;type=friend<\/code><\/li>\n<li>Use the token to get unauthorized access to <code>\/include\/findusers.php<\/code><\/li>\n<li>Exploit the SQL injection in a boolean-based fashion to fetch the database name<\/li>\n<li>Exploit the SQL injection in a time-based fashion to fetch the tables prefix (by using the trick to bypass Protector)<\/li>\n<li>Exploit the SQL injection to create a new admin user\n<\/li>\n<li>Login as admin and abuse the \u201cAuto Tasks\u201d feature to execute arbitrary PHP code<\/li>\n<\/ul>\n<p><a class=\"post\" href=\"http:\/\/karmainsecurity.com\/pocs\/CVE-2021-26599.php\" target=\"_blank\" rel=\"noopener\">Here<\/a> you can find a full working Proof of Concept (PoC) script which reproduces the above steps. It\u2019s a PHP script supposed to be used from the command line (CLI), and you should see an output like the following:<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/karmainsecurity.com\/data\/img\/impresscms-poc.png\"><\/p>\n<p class=\"big-caption\">Conclusion<\/p>\n<p>I think it\u2019s very hilarious and ironic that <a class=\"post\" href=\"https:\/\/dev.mysql.com\/doc\/refman\/8.0\/en\/sql-prepared-statements.html\" target=\"_blank\" rel=\"noopener\">Prepared Statements<\/a>, which are generally intended as a protection against SQL injection vulnerabilities, can also be abused to bypass a security mechanism designed to prevent SQL injection attacks! Furthermore, I have a feeling that this SQL injection exploitation technique can be used to bypass most Web Application Firewalls (<a class=\"post\" href=\"https:\/\/en.wikipedia.org\/wiki\/Web_application_firewall\" target=\"_blank\" rel=\"noopener\">WAF<\/a>) out there, and this makes me think about a lesson I learnt some time ago: application security is a process, not a product!<br \/>Probably WAF vendors will point the finger at me, but I truly believe that too often the concept of \u201capplication security\u201d is being confused with the \u201cnetwork security\u201d one, and people think they are safe just because they have a firewall: ok, you can also implement security protections at the application level, like a WAF, and by doing that the overall application security could be definitely increased. On the other hand, I believe these solutions shouldn\u2019t be considered bullet proof, as they can\u2019t completely save your ass if you also have security bugs in your code, and this ImpressCMS case is a clear example of that.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33248\/ImpressCMS-From-Unauthenticated-SQL-Injection-To-RCE.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":45844,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[256],"class_list":["post-45843","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinehackerflaw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ImpressCMS: From Unauthenticated SQL Injection To RCE 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ImpressCMS: From Unauthenticated SQL Injection To RCE 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-23T15:59:26+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/karmainsecurity.com\/data\/img\/impresscms-poc.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/impresscms-from-unauthenticated-sql-injection-to-rce\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/impresscms-from-unauthenticated-sql-injection-to-rce\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"ImpressCMS: From Unauthenticated SQL Injection To RCE\",\"datePublished\":\"2022-03-23T15:59:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/impresscms-from-unauthenticated-sql-injection-to-rce\\\/\"},\"wordCount\":1209,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/impresscms-from-unauthenticated-sql-injection-to-rce\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/impresscms-from-unauthenticated-sql-injection-to-rce.png\",\"keywords\":[\"headline,hacker,flaw\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/impresscms-from-unauthenticated-sql-injection-to-rce\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/impresscms-from-unauthenticated-sql-injection-to-rce\\\/\",\"name\":\"ImpressCMS: From Unauthenticated SQL Injection To RCE 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/impresscms-from-unauthenticated-sql-injection-to-rce\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/impresscms-from-unauthenticated-sql-injection-to-rce\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/impresscms-from-unauthenticated-sql-injection-to-rce.png\",\"datePublished\":\"2022-03-23T15:59:26+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/impresscms-from-unauthenticated-sql-injection-to-rce\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/impresscms-from-unauthenticated-sql-injection-to-rce\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/impresscms-from-unauthenticated-sql-injection-to-rce\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/impresscms-from-unauthenticated-sql-injection-to-rce.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/impresscms-from-unauthenticated-sql-injection-to-rce.png\",\"width\":982,\"height\":492},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/impresscms-from-unauthenticated-sql-injection-to-rce\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,flaw\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerflaw\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ImpressCMS: From Unauthenticated SQL Injection To RCE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ImpressCMS: From Unauthenticated SQL Injection To RCE 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/","og_locale":"en_US","og_type":"article","og_title":"ImpressCMS: From Unauthenticated SQL Injection To RCE 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-23T15:59:26+00:00","og_image":[{"url":"http:\/\/karmainsecurity.com\/data\/img\/impresscms-poc.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"ImpressCMS: From Unauthenticated SQL Injection To RCE","datePublished":"2022-03-23T15:59:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/"},"wordCount":1209,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/impresscms-from-unauthenticated-sql-injection-to-rce.png","keywords":["headline,hacker,flaw"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/","url":"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/","name":"ImpressCMS: From Unauthenticated SQL Injection To RCE 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/impresscms-from-unauthenticated-sql-injection-to-rce.png","datePublished":"2022-03-23T15:59:26+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/impresscms-from-unauthenticated-sql-injection-to-rce.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/impresscms-from-unauthenticated-sql-injection-to-rce.png","width":982,"height":492},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/impresscms-from-unauthenticated-sql-injection-to-rce\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,flaw","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerflaw\/"},{"@type":"ListItem","position":3,"name":"ImpressCMS: From Unauthenticated SQL Injection To RCE"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45843"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45843\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/45844"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}