{"id":"CVE-2018-19895","details":"ThinkCMF X2.2.2 has SQL Injection via the function edit_post() in NavController.class.php and is exploitable with the manager privilege via the parentid parameter in a nav action.","modified":"2026-03-14T09:28:55.383839Z","published":"2018-12-06T04:29:00.313Z","references":[{"type":"EVIDENCE","url":"https://github.com/thinkcmf/cmfx/issues/26"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/thinkcmf/cmfx","events":[{"introduced":"0"},{"last_affected":"fed8f4aaff2d8d9c1e51047e421cb0965bb485b5"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"x2.2.2"}]}}],"versions":["X2.2.0","X2.2.1","X2.2.2","x1.6.0","x2.1.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-19895.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}