Security vulnerabilities

  • Status Closed
  • Assigned To
    cbay
  • Private
Attached to Project: Security vulnerabilities
Opened by AbhishekV - 08.12.2025
Last edited by cbay - 09.12.2025

FS#261 - SQL Injection Vulnerability Report in https://help.alwaysdata.com/en/

Target Application: https://help.alwaysdata.com/en/ (Search Function)
Date of Test: December 8, 2025
Tester: Abhishek V
Mail id: abhi18vedamurthy@gmail.com

Description: The search functionality of the test website is vulnerable to SQL injection. A classic payload (OR 1=1;–) was entered into the search field, and the application returned 94 results, indicating that the input was directly concatenated into a SQL query without proper sanitization or parameterization.

Steps to Reproduce:
1. Navigate to the target website.
2. Locate the search input field.
3. Enter the following payload with a space after the double – OR 1=1;–
4. Submit the search.
Observation: 94 results are returned, bypassing any intended filtering logic.

Impact Assessment
1. Risk Level: Medium to High depending what results are returned
2. Potential Impact:
a. Unauthorized data access
b. Data leakage or manipulation

Recommended Remediation
1. Input Validation and Escaping
2. Reject or sanitize unexpected characters in user input.
3. Rejecting the statements that have the syntax of SQL queries.

POC: Refer to the video attachment named SQLi

   SQLi.mp4 (32.61 MiB)
Closed by  cbay
09.12.2025 10:50
Reason for closing:  Invalid

.

   SQLi.mp4 (32.61 MiB)

Image attached

   SQLi.png (159.7 KiB)
Admin
cbay commented on 09.12.2025 10:49

Hello,

We're using Hugo, a static site generator. There's no SQL database at all, and the search is done purely locally.

So there's definitely no possible SQL injection here.

Kind regards,
Cyril

Loading...

Available keyboard shortcuts

Tasklist

Task Details

Task Editing