CVE-2026-30463
Published: 26 March 2026
Summary
CVE-2026-30463 is a high-severity SQL Injection (CWE-89) vulnerability in Thedaylightstudio Fuel Cms. Its CVSS base score is 7.7 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of untrusted inputs to the /controllers/Login.php password reset component, directly preventing SQL injection exploitation.
Mandates timely identification, reporting, and correction of the SQL injection flaw in FuelCMS v1.5.2, eliminating the vulnerability.
Vulnerability scanning detects SQL injection issues like this unauthenticated remote vulnerability in the login component.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing FuelCMS Login.php (password reset) directly enables remote exploitation of the web app per T1190, yielding DB confidentiality/integrity impact without auth.
NVD Description
Daylight Studio FuelCMS v1.5.2 was discovered to contain a SQL injection vulnerability via the /controllers/Login.php component.
Deeper analysisAI
CVE-2026-30463, published on 2026-03-26, is a SQL injection vulnerability (CWE-89) affecting Daylight Studio FuelCMS version 1.5.2 in the /controllers/Login.php component. The issue has a CVSS v3.1 base score of 7.7, rated as high severity with vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L.
Unauthenticated remote attackers can exploit this vulnerability over the network, though it requires high attack complexity and no user interaction. Successful exploitation enables high-impact confidentiality and integrity violations, such as unauthorized access to or modification of sensitive database information, alongside low-impact availability disruption.
Advisories and related resources include vendor information at http://daylight.com and http://fuelcms.com, along with a pentest report detailing the SQL injection via password reset at https://pentest-tools.com/PTT-2025-030%E2%80%93SQL-Injection-via-Password-Reset.pdf.
Details
- CWE(s)