Skip to content

Conversation

@zeropath-ai-staging
Copy link

Successful SQL injection could expose sensitive user data or allow unauthorized access. The get_user_by_id function in ws.php (lines 22-37) directly uses the lookup_user GET parameter without sanitization, which causes unsanitized data to be passed directly into a SQL query. An attacker could manipulate this parameter to inject arbitrary SQL code, potentially extracting user credentials or modifying application data.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant