๐Ÿ” CVE Alert

CVE-2026-40331

UNKNOWN 0.0

Masa CMS unauthenticated SQL injection via altTable parameter in JSON API

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Masa CMS is an open source content management system. In versions 7.2.0 through 7.2.9, 7.3.0 through 7.3.14, 7.4.0 through 7.4.9, and 7.5.0 through 7.5.2, the unauthenticated JSON API accepts an altTable parameter that is stored via the setAltTable() method without validation or sanitization. This value is injected directly into a SQL FROM clause within feedGateway.cfc. An unauthenticated attacker can pass an arbitrary subquery into the altTable parameter to read sensitive data from any table in the database in a single HTTP request, including administrative credentials and password reset tokens. This issue has been fixed in versions 7.2.10, 7.3.15, 7.4.10, and 7.5.3. As a workaround, apply validation to the setAltTable function in core/mura/content/feed/feedBean.cfc to restrict input to simple alphanumeric table names, or disable the JSON API if it is not required.

CWE CWE-89
Vendor masacms
Product masacms
Published May 5, 2026
Stay Ahead of the Next One

Get instant alerts for masacms masacms

Be the first to know when new unknown vulnerabilities affecting masacms masacms are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

MasaCMS / MasaCMS
<= 7.2.9 >= 7.3.0, <= 7.3.14 >= 7.4.0, <= 7.4.9 >= 7.5.0, <= 7.5.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/MasaCMS/MasaCMS/security/advisories/GHSA-jphh-r686-6w7j