Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-6982
PUBLISHED
More InfoOfficial Page
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
View Known Exploited Vulnerability (KEV) details
Published At-25 Apr, 2026 | 14:30
Updated At-27 Apr, 2026 | 13:34
Rejected At-
▼CVE Numbering Authority (CNA)
star7th ShowDoc API Page Sort Endpoint PageController.class.PHP sql injection

A vulnerability was determined in star7th ShowDoc up to 2.10.10/3.6.2/3.8.0. Affected by this vulnerability is an unknown functionality of the file server/Application/Api/Controller/PageController.class.PHP of the component API Page Sort Endpoint. Executing a manipulation of the argument pages can lead to sql injection. The attack may be launched remotely. Upgrading to version 3.8.1 addresses this issue. It is suggested to upgrade the affected component. According to the researcher, "[t]he vendor explicitly stated they will not backport patches to the older affected versions."

Affected Products
Vendor
star7th
Product
ShowDoc
CPEs
  • cpe:2.3:a:showdoc:showdoc:*:*:*:*:*:*:*:*
Modules
  • API Page Sort Endpoint
Versions
Affected
  • 2.10.0
  • 2.10.1
  • 2.10.2
  • 2.10.3
  • 2.10.4
  • 2.10.5
  • 2.10.6
  • 2.10.7
  • 2.10.8
  • 2.10.9
  • 2.10.10
  • 3.0
  • 3.1
  • 3.2
  • 3.3
  • 3.4
  • 3.5
  • 3.6
  • 3.6.0
  • 3.6.1
  • 3.6.2
  • 3.7
  • 3.8.0
Unaffected
  • 3.8.1
Problem Types
TypeCWE IDDescription
CWECWE-89SQL Injection
CWECWE-74Injection
Type: CWE
CWE ID: CWE-89
Description: SQL Injection
Type: CWE
CWE ID: CWE-74
Description: Injection
Metrics
VersionBase scoreBase severityVector
4.05.3MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X
3.16.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C
3.06.3MEDIUM
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C
2.06.5N/A
AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:OF/RC:C
Version: 4.0
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C
Version: 3.0
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C
Version: 2.0
Base score: 6.5
Base severity: N/A
Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:OF/RC:C
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
LIU Tingwei (VulDB User)
coordinator
VulDB CNA Team
Timeline
EventDate
Advisory disclosed2026-04-24 00:00:00
VulDB entry created2026-04-24 02:00:00
VulDB entry last update2026-04-24 21:08:21
Event: Advisory disclosed
Date: 2026-04-24 00:00:00
Event: VulDB entry created
Date: 2026-04-24 02:00:00
Event: VulDB entry last update
Date: 2026-04-24 21:08:21
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/vuln/359525
vdb-entry
technical-description
https://vuldb.com/vuln/359525/cti
signature
permissions-required
https://vuldb.com/submit/795528
third-party-advisory
https://gist.github.com/saDL0w/555e19668264f98d96259ad47ea33811
related
https://github.com/star7th/showdoc/releases/tag/v3.8.1
patch
Hyperlink: https://vuldb.com/vuln/359525
Resource:
vdb-entry
technical-description
Hyperlink: https://vuldb.com/vuln/359525/cti
Resource:
signature
permissions-required
Hyperlink: https://vuldb.com/submit/795528
Resource:
third-party-advisory
Hyperlink: https://gist.github.com/saDL0w/555e19668264f98d96259ad47ea33811
Resource:
related
Hyperlink: https://github.com/star7th/showdoc/releases/tag/v3.8.1
Resource:
patch
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found