vBulletin 5.5.4 allows Two SQL Injection Vulnerabilities

Overview :
vBulletin 5.5.4 allows SQL Injection via the ajax/api/hook/getHookList or ajax/api/widget/getWidgetList where parameter.
Affected Product(s) :
  • vBulletin 5.5.4
Vulnerability Details :
CVE ID : CVE-2019-17271
1) User input passed through keys of the “where” parameter to
the “ajax/api/hook/getHookList” endpoint is not properly validated
before being used in an SQL query. This can be exploited to e.g.
read sensitive data from the database through in-band SQL injection
attacks. Successful exploitation of this vulnerability requires an
user account with the “canadminproducts” or “canadminstyles” permission.2) User input passed through keys of the “where” parameter to
the “ajax/api/widget/getWidgetList” endpoint is not properly validated
before being used in an SQL query. This can be exploited to e.g.
read sensitive data from the database through time-based SQL injection
attacks. Successful exploitation of this vulnerability requires an
user account with the “canusesitebuilder” permission.

Solution :
Apply the vendor Security Patch Level 2 or upgrade to version 5.5.5 or
later.

Facebook
Twitter
LinkedIn

Recent Blog Posts

Cybersecurity Awareness Month 2025
Layer 7 Attack Recovery Guide Step by Step (2025)
Top 12 Features Every MSSP Needs in a WAAP Platform (2025 Guide)
Top 8 Cybersecurity Challenges Indian Enterprises Face in 2025
Best Tools to Identify Broken Access Control in APIs

WAF Solution