Cyber Posture

CVE-2026-3292

MediumPublic PoC

Published: 27 February 2026

Published
27 February 2026
Modified
27 February 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0001 2.2th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-3292 is a medium-severity Injection (CWE-74) vulnerability in Jizhicms Jizhicms. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 2.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-89

Penetration testing uses SQL injection payloads against database interfaces, identifying and supporting fixes for SQL injection weaknesses.

addresses: CWE-74

Developer assessments and testing (including injection-focused techniques) identify improper neutralization of special elements, and the verifiable flaw remediation corrects them pre-deployment.

addresses: CWE-89

Validates query inputs to prevent SQL syntax or command manipulation.

addresses: CWE-74

Identifies indicators of injection attacks (command, SQL, LDAP, etc.) via anomaly and attack monitoring.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote SQL injection in a web-based CMS Batch Interface (publicly exploitable with no auth bypass needed) directly maps to exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A security vulnerability has been detected in jizhiCMS up to 2.5.6. Affected is the function findAll in the library frphp/lib/Model.php of the component Batch Interface. The manipulation of the argument data leads to sql injection. The attack is possible to…

more

be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2026-3292, published on 2026-02-27, is a SQL injection vulnerability in jizhiCMS versions up to 2.5.6. The flaw affects the findAll function in the frphp/lib/Model.php library of the Batch Interface component, where manipulation of the data argument enables injection. It is classified under CWE-74 (Improper Neutralization of Special Elements used in an SQL Command) and CWE-89 (SQL Injection).

The vulnerability carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), allowing remote exploitation by low-privileged users with low attack complexity and no user interaction required. Attackers can inject malicious SQL via the data argument in the Batch Interface, potentially leading to limited impacts on confidentiality (e.g., data exposure), integrity (e.g., data modification), and availability (e.g., denial of service).

Advisories from VulDB and a public GitHub Gist reference disclose the exploit details, including proof-of-concept code. No patches or vendor response are available despite early notification, leaving affected systems reliant on custom mitigations like input sanitization or disabling the vulnerable component.

The exploit has been publicly disclosed and may be used, heightening risk for unpatched jizhiCMS deployments.

Details

CWE(s)

Affected Products

jizhicms
jizhicms
≤ 2.5.6

CVEs Like This One

CVE-2025-50229Same product: Jizhicms Jizhicms
CVE-2025-70397Same product: Jizhicms Jizhicms
CVE-2025-50228Same product: Jizhicms Jizhicms
CVE-2025-25784Same product: Jizhicms Jizhicms
CVE-2025-25785Same product: Jizhicms Jizhicms
CVE-2020-37117Same product: Jizhicms Jizhicms
CVE-2026-4844Shared CWE-74, CWE-89
CVE-2025-0698Shared CWE-74, CWE-89
CVE-2026-3790Shared CWE-74, CWE-89
CVE-2026-5813Shared CWE-74, CWE-89

References