Loading
Generated remediation guidance and an executive summary. No account required.
SSCMS v7.4.0 contains a SQL injection vulnerability in the stl:sqlContent tag where the queryString attribute is passed directly to database execution without parameterization or sanitization. Attackers can craft encrypted payloads submitted to the /api/stl/actions/dynamic endpoint to execute arbitrary SQL statements, leading to unauthorized database access, data disclosure, authentication bypass, data modification, or complete database compromise.
No affected products information available.
Use CWE-89 to widen CVE-2026-7435 into its surrounding weakness, vendor, and product context.