Joomla! Component EkRishta 2.10 contains an error-based SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the username parameter. Attackers can submit POST requests to the login endpoint with SQL injection payloads in the username field to extract database information including user credentials and system details.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 23 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Joomla! Component EkRishta 2.10 contains an error-based SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the username parameter. Attackers can submit POST requests to the login endpoint with SQL injection payloads in the username field to extract database information including user credentials and system details. | |
| Title | Joomla! Component EkRishta 2.10 SQL Injection via username | |
| First Time appeared |
Harmistechnology
Harmistechnology ek Rishta |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:harmistechnology:ek_rishta:2.10:*:*:*:*:joomla\!:*:* | |
| Vendors & Products |
Harmistechnology
Harmistechnology ek Rishta |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-23T18:30:51.894Z
Reserved: 2026-05-23T15:35:35.751Z
Link: CVE-2018-25351
No data.
No data.
No data.
OpenCVE Enrichment
Updated: 2026-05-23T19:30:25Z
Weaknesses