CVE-2026-0843

6.3 MEDIUM

📋 TL;DR

This SQL injection vulnerability in jjjfood and jjjshop_food systems allows attackers to manipulate database queries via the latitude parameter in the product.category/index API endpoint. Attackers can potentially read, modify, or delete database content remotely. Affected systems include all installations of these products up to version 20260103.

💻 Affected Systems

Products:
  • jiujiujia/victor123/wxw850227 jjjfood
  • jjjshop_food
Versions: All versions up to 20260103
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Product is distributed under multiple different names. The vulnerable endpoint /index.php/api/product.category/index is likely part of default installations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive data exfiltration, authentication bypass, remote code execution, and system takeover.

🟠

Likely Case

Data theft of customer information, order history, and potentially administrative credentials stored in the database.

🟢

If Mitigated

Limited impact with proper input validation and WAF rules blocking malicious SQL patterns.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible remotely and public exploits exist.
🏢 Internal Only: MEDIUM - Internal systems could still be exploited by malicious insiders or compromised internal hosts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit has been publicly disclosed and requires minimal technical skill to execute. The vulnerability is in a parameter that likely receives user input without proper validation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative software or implementing workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation for the latitude parameter to only accept expected data formats

Modify /index.php/api/product.category/index to validate latitude parameter using PHP filter_var() or custom validation

WAF Rule Implementation

all

Deploy web application firewall rules to block SQL injection attempts targeting the vulnerable endpoint

Add WAF rule: block requests to /index.php/api/product.category/index containing SQL keywords in latitude parameter

🧯 If You Can't Patch

  • Isolate affected systems behind reverse proxy with strict input filtering
  • Implement network segmentation to limit database access from web servers

🔍 How to Verify

Check if Vulnerable:

Test the /index.php/api/product.category/index endpoint with SQL injection payloads in the latitude parameter (e.g., latitude=1' OR '1'='1)

Check Version:

Check version information in application files or database configuration tables

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and that input validation is properly implemented

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple requests to /index.php/api/product.category/index with suspicious latitude values
  • Database query errors containing user input

Network Indicators:

  • HTTP requests to vulnerable endpoint with SQL keywords in parameters
  • Unusual database traffic patterns from web servers

SIEM Query:

source="web_logs" AND uri="/index.php/api/product.category/index" AND (latitude="*'*" OR latitude="*OR*" OR latitude="*UNION*" OR latitude="*SELECT*")

🔗 References

📤 Share & Export