CVE-2024-58308
Published: 11 December 2025
Summary
CVE-2024-58308 is a critical-severity SQL Injection (CWE-89) vulnerability in Opensolution Quick Cms. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 36.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly validates login form inputs to block malicious SQL payloads like ' or '1'='1', preventing authentication bypass via SQL injection.
Restricts login form inputs to whitelisted characters and lengths, blocking SQL injection payloads in the Quick.CMS administrative login.
Remediates the specific SQL injection flaw in Quick.CMS 6.7 login form through timely patching and flaw correction.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in the public-facing admin login form enables unauthenticated remote exploitation of a public-facing web application (T1190) for authentication bypass and arbitrary SQL execution.
NVD Description
Quick.CMS 6.7 contains a SQL injection vulnerability that allows unauthenticated attackers to bypass login authentication by manipulating the login form. Attackers can inject specific SQL payloads like ' or '1'='1 to gain unauthorized administrative access to the system.
Deeper analysisAI
CVE-2024-58308 is a SQL injection vulnerability in Quick.CMS version 6.7, affecting the login form in the administrative interface. The flaw, classified under CWE-89, enables attackers to manipulate SQL queries during authentication attempts. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and lack of prerequisites.
Unauthenticated remote attackers can exploit this vulnerability by submitting malicious payloads, such as ' or '1'='1, directly into the login form fields. Successful exploitation bypasses authentication entirely, granting unauthorized administrative access to the Quick.CMS system. This access could allow attackers to execute arbitrary SQL commands, potentially leading to full compromise including data exfiltration, modification, or deletion.
Advisories and references, including those from VulnCheck and Exploit-DB, detail the authentication bypass via the admin login SQL injection. An exploit is publicly available at Exploit-DB (ID 51910). The vendor's site at opensolution.org provides downloads for Quick.CMS 6.7, but no specific patch details are outlined in the provided information; practitioners should verify updates directly from the vendor.
An exploit proof-of-concept is available on Exploit-DB, indicating potential for real-world abuse against unpatched Quick.CMS 6.7 installations.
Details
- CWE(s)