Skip to content

Validate extra_where to prevent SQL injection in admin/security_center.php#106

Closed
zeropath-ai-staging[bot] wants to merge 1 commit intonew_featurefrom
zvuln_fix_b4fd2f4b
Closed

Validate extra_where to prevent SQL injection in admin/security_center.php#106
zeropath-ai-staging[bot] wants to merge 1 commit intonew_featurefrom
zvuln_fix_b4fd2f4b

Conversation

@zeropath-ai-staging
Copy link

A SQL injection vulnerability exists in the Security Center admin page, potentially allowing unauthorized database access. Specifically, the extra_where parameter in admin/security_center.php (lines 130-132) is not properly validated when the type parameter is set to download_attempts, which could allow an attacker to inject malicious SQL queries. This can lead to unauthorized data retrieval, modification, or deletion from the database.

@hugbubby hugbubby closed this Feb 12, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant