A SQL Injection issue was discovered in webERP 4.15. Payments.php accepts payment data in base64 format. After this is decoded, it is deserialized. Then, this deserialized data goes directly into a SQL query, with no sanitizing checks.
| Software | From | Fixed in |
|---|---|---|
| weberp / weberp | 4.15 | 4.15.x |