๐Ÿ” CVE Alert

CVE-2026-40330

UNKNOWN 0.0

Masa CMS SQL injection via sortDirection parameter in beanFeed

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Masa CMS is an open source content management system. In versions 7.2.0 through 7.2.9, 7.3.0 through 7.3.14, 7.4.0 through 7.4.9, and 7.5.0 through 7.5.2, a SQL injection vulnerability exists in the beanFeed.cfc component within the getQuery function's handling of the sortDirection parameter. The parameter value is concatenated directly into SQL queries without sanitization or parameterization. An unauthenticated remote attacker can exploit this to extract sensitive information, modify or delete database records, or potentially achieve remote code execution on the underlying database server. This issue has been fixed in versions 7.2.10, 7.3.15, 7.4.10, and 7.5.3. As a workaround, use a WAF to block or restrict access to the beanFeed.cfc component, or deploy rules to detect SQL injection patterns targeting the sortDirection parameter.

CWE CWE-89
Vendor masacms
Product masacms
Published May 5, 2026
Stay Ahead of the Next One

Get instant alerts for masacms masacms

Be the first to know when new unknown vulnerabilities affecting masacms masacms are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

MasaCMS / MasaCMS
<= 7.2.9 >= 7.3.0, <= 7.3.14 >= 7.4.0, <= 7.4.9 >= 7.5.0, <= 7.5.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/MasaCMS/MasaCMS/security/advisories/GHSA-56cc-gxfr-hqp8