CVE-2026-7489
Published: 02 May 2026
Summary
CVE-2026-7489 is a high-severity SQL Injection (CWE-89) vulnerability in Org (inferred from references). Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents SQL injection like CVE-2026-7489 by requiring validation and sanitization of user inputs before incorporation into database queries.
SI-2 requires organizations to identify, report, and remediate software flaws such as the SQL injection vulnerability in CTMS.
AC-6 least privilege restricts database account permissions, limiting the scope of damage from successful SQL injection exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in remotely accessible application directly enables T1190 exploitation and facilitates T1213.006 database data collection, T1565.001 stored data manipulation, and T1485 data destruction via read/modify/delete operations.
NVD Description
CTMS developed by Sunnet has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
Deeper analysisAI
CVE-2026-7489 is a SQL injection vulnerability (CWE-89) affecting CTMS, a product developed by Sunnet. The flaw enables authenticated remote attackers to inject arbitrary SQL commands, allowing them to read, modify, and delete database contents. It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-05-02T10:16:18.803.
Authenticated remote attackers with low privileges can exploit this vulnerability over the network with low attack complexity and without requiring user interaction. Successful exploitation results in high impacts on confidentiality, integrity, and availability, potentially leading to complete database compromise through unauthorized data access, alteration, or destruction.
Advisories from TWCERT/CC, available at https://www.twcert.org.tw/en/cp-139-10895-25ca1-2.html and https://www.twcert.org.tw/tw/cp-132-10894-1ac1f-1.html, provide further details on the issue.
Details
- CWE(s)