CVE-2026-3292
Published: 27 February 2026
Summary
CVE-2026-3292 is a medium-severity Injection (CWE-74) vulnerability in Jizhicms Jizhicms. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 2.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Penetration testing uses SQL injection payloads against database interfaces, identifying and supporting fixes for SQL injection weaknesses.
Developer assessments and testing (including injection-focused techniques) identify improper neutralization of special elements, and the verifiable flaw remediation corrects them pre-deployment.
Validates query inputs to prevent SQL syntax or command manipulation.
Identifies indicators of injection attacks (command, SQL, LDAP, etc.) via anomaly and attack monitoring.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote SQL injection in a web-based CMS Batch Interface (publicly exploitable with no auth bypass needed) directly maps to exploitation of a public-facing application.
NVD Description
A security vulnerability has been detected in jizhiCMS up to 2.5.6. Affected is the function findAll in the library frphp/lib/Model.php of the component Batch Interface. The manipulation of the argument data leads to sql injection. The attack is possible to…
more
be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2026-3292, published on 2026-02-27, is a SQL injection vulnerability in jizhiCMS versions up to 2.5.6. The flaw affects the findAll function in the frphp/lib/Model.php library of the Batch Interface component, where manipulation of the data argument enables injection. It is classified under CWE-74 (Improper Neutralization of Special Elements used in an SQL Command) and CWE-89 (SQL Injection).
The vulnerability carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), allowing remote exploitation by low-privileged users with low attack complexity and no user interaction required. Attackers can inject malicious SQL via the data argument in the Batch Interface, potentially leading to limited impacts on confidentiality (e.g., data exposure), integrity (e.g., data modification), and availability (e.g., denial of service).
Advisories from VulDB and a public GitHub Gist reference disclose the exploit details, including proof-of-concept code. No patches or vendor response are available despite early notification, leaving affected systems reliant on custom mitigations like input sanitization or disabling the vulnerable component.
The exploit has been publicly disclosed and may be used, heightening risk for unpatched jizhiCMS deployments.
Details
- CWE(s)