vendor:
                    Quick.CMS
                by:
                    ./H4X.Forensics - Diyar
                6.1
                        CVSS
                    HIGH
                    SQL Injection
                    89
                        CWE
                    Product Name: Quick.CMS
                    Affected Version From:  6.7
                    Affected Version To:  6.7
                    Patch Exists: NO
                    Related CWE: 
                    CPE:  a:opensolution:quick.cms:6.7
                    Platforms Tested:  Windows
                    2024
                    Quick.CMS 6.7 SQL Injection Login Bypass
The exploit allows an attacker to bypass authentication in Quick.CMS 6.7 by using a specific SQL injection payload. By entering the payload ' or '1'='1 in the email field and proceeding with the login, the attacker can successfully bypass the authentication and gain unauthorized access to the admin panel.
Mitigation:
					To mitigate this vulnerability, it is recommended to sanitize user inputs, implement prepared statements or parameterized queries, and apply the principle of least privilege.