PatchSiren cyber security CVE debrief
CVE-2017-6065 Metalgenix CVE debrief
CVE-2017-6065 describes a SQL injection flaw in GeniXCMS backend menu handling. An authenticated remote attacker can abuse the vulnerable order parameter in inc/lib/Control/Backend/menus.control.php to execute arbitrary SQL commands. NVD assigns a high-severity CVSS 3.0 score of 8.8, reflecting network reachability, low attack complexity, and high impact to confidentiality, integrity, and availability.
- Vendor
- Metalgenix
- Product
- CVE-2017-6065
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-17
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-17
- Advisory updated
- 2026-05-13
Who should care
GeniXCMS administrators, backend maintainers, and security teams responsible for deployments that expose authenticated administration functions. Any environment allowing non-fully-trusted users to reach backend menu controls should treat this as a priority.
Technical summary
The vulnerability is a CWE-89 SQL injection in the backend menus control code path. According to the CVE description, the vulnerable input is the order parameter in inc/lib/Control/Backend/menus.control.php. NVD lists the impact as CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating a remote authenticated attacker could execute arbitrary SQL and potentially affect data confidentiality, integrity, and availability. NVD’s CPE data marks GeniXCMS versions through 1.0.1 as vulnerable, while the CVE description says through 1.0.2; that version-range difference should be treated cautiously until vendor guidance is confirmed.
Defensive priority
High. This is a remotely reachable authenticated SQL injection with full CIA impact in the scoring record, so exposed installations should be patched or isolated promptly.
Recommended defensive actions
- Apply the vendor fix or patch referenced by the linked GeniXCMS issue and upgrade to a version confirmed to be outside the vulnerable range.
- Treat versions covered by the NVD CPE range through 1.0.1, and the CVE description’s through 1.0.2 wording, as vulnerable until the discrepancy is resolved by vendor guidance.
- Restrict backend access to trusted administrative users only, enforce least privilege, and review who can reach menu-management functions.
- Inspect application and database logs for unusual SQL patterns or unexpected backend menu operations around the affected code path.
- Review the affected code to ensure the order parameter is validated against an allowlist and that SQL is built with parameterized queries rather than string concatenation.
- If suspicious activity is found, rotate database credentials and assess for unauthorized data access or modification.
Evidence notes
Source evidence comes from the official CVE/NVD records supplied in the corpus. The CVE description states a SQL injection in inc/lib/Control/Backend/menus.control.php affecting GeniXCMS through 1.0.2 and reachable via the order parameter. NVD lists CWE-89 and CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, and its CPE metadata marks cpe:2.3:a:metalgenix:genixcms:*:*:*:*:*:*:*:* as vulnerable through 1.0.1. NVD also references GitHub issue #71 as an issue-tracking/patch/vendor reference. The vendor/product mapping in the supplied metadata is somewhat inconsistent, so version scope should be verified against vendor guidance before remediation planning.
Official resources
-
CVE-2017-6065 CVE record
CVE.org
-
CVE-2017-6065 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch, Third Party Advisory
CVE published on 2017-02-17. NVD record last modified on 2026-05-13. This debrief uses the CVE publication date for timing context.