Joomla! Component Ek Rishta 2.10 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cid parameter. Attackers can send GET requests to the user_detail view with malicious cid values containing SQL commands to extract sensitive database information.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 23 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Joomla! Component Ek Rishta 2.10 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cid parameter. Attackers can send GET requests to the user_detail view with malicious cid values containing SQL commands to extract sensitive database information. | |
| Title | Joomla! Component Ek Rishta 2.10 SQL Injection via user_detail | |
| First Time appeared |
Harmistechnology
Harmistechnology ek Rishta |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:harmistechnology:ek_rishta:2.10:*:*:*:*:joomla\!:*:* | |
| Vendors & Products |
Harmistechnology
Harmistechnology ek Rishta |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-23T18:30:49.735Z
Reserved: 2026-05-23T15:31:00.574Z
Link: CVE-2018-25348
No data.
No data.
No data.
OpenCVE Enrichment
No data.
Weaknesses