CVE-2026-30813
Published: 13 April 2026
Summary
CVE-2026-30813 is a high-severity SQL Injection (CWE-89) vulnerability in Artica Pandora Fms. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 9.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires information input validation at entry points like the module search function, directly preventing SQL injection by neutralizing special elements in SQL commands.
SI-2 mandates identification, reporting, and correction of flaws such as the SQL injection vulnerability in Pandora FMS versions 777 through 800.
SI-9 enforces input restrictions at system boundaries, limiting the module search inputs to mitigate SQL injection attempts through whitelisting or length/type constraints.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in the web-based Pandora FMS module search function directly enables remote exploitation of a public-facing application (T1190) by low-privileged authenticated users, leading to high-impact database access, modification, or DoS.
NVD Description
Improper Neutralization of Special Elements used in an SQL Command vulnerability allows SQL Injection via module search. This issue affects Pandora FMS: from 777 through 800
Deeper analysisAI
CVE-2026-30813, published on 2026-04-13, is an Improper Neutralization of Special Elements used in an SQL Command vulnerability (CWE-89) that enables SQL Injection via the module search function in Pandora FMS. This issue affects versions 777 through 800. The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility, low complexity, and potential for significant impacts.
Low-privileged authenticated users (PR:L) can exploit the vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and without requiring user interaction (UI:N). Successful exploitation can result in high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), allowing attackers within scope (S:U) to potentially extract sensitive data from the database, modify records, or cause denial of service.
Mitigation details are available in the Pandora FMS security advisory at https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/.
Details
- CWE(s)