SocialEngine <= 7.8.0 (get-memberall) SQL Injection Vulnerability
• Software Link:
• Affected Versions:
Versions 7.8.0, 7.7.0, and likely prior versions.
• Vulnerability Description:
User input passed through the “text” request parameter to the /activity/index/get-memberall endpoint is not properly sanitized before being used to construct an SQL query. This can be exploited by remote, unauthenticated attackers to read arbitrary, sensitive data from the underlying database through in-band SQL Injection attacks.
NOTE: this might also be exploited to reset admin users' passwords and gain unauthorized access to the “Packages Manager” in the Admin Panel, in order to achieve Remote Code Execution (RCE).
• Proof of Concept:
https://karmainsecurity.com/pocs/CVE-2026-41460.php
• Solution:
No official solution is currently available.
• Disclosure Timeline:
[02/02/2026] – Vulnerability confirmed on version 7.7.0
[02/02/2026] – Vendor notified
[09/02/2026] – Vendor response stating “We are currently validating your report… If this issue is confirmed, we will prioritize appropriate fixes and include them in an upcoming update.”
[27/02/2026] – Vendor released version 7.8.0, but the vulnerability is still not fixed
[02/03/2026] – Vendor contacted again
[09/03/2026] – Vendor response stating “We will check and update you.”
[23/03/2026] – Vendor notified about 60-day disclosure deadline policy
[25/03/2026] – Vendor said this issue has been fixed on the demo website, and invited me to test it
[25/03/2026] – Vendor was informed the demo website looks not vulnerable anymore
[03/04/2026] – Reached 60-day disclosure deadline, still no official solution
[21/04/2026] – CVE identifier requested
[22/04/2026] – CVE identifier assigned
[23/04/2026] – Public disclosure
• CVE Reference:
CVE-2026-41460 has been assigned to this vulnerability.
• Credits:
Vulnerability discovered by Egidio Romano.