The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-6982

CVE-2026-6982: ShowDoc SQL Injection Vulnerability

CVE-2026-6982 is a SQL injection vulnerability in star7th ShowDoc affecting versions up to 2.10.10, 3.6.2, and 3.8.0. Attackers can exploit the API Page Sort Endpoint remotely. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: April 30, 2026

CVE-2026-6982 Overview

A SQL Injection vulnerability has been identified in star7th ShowDoc, an open-source API documentation platform. The vulnerability affects the API Page Sort Endpoint, specifically within the file server/Application/Api/Controller/PageController.class.PHP. By manipulating the pages argument, an attacker with low privileges can inject malicious SQL commands, potentially compromising database integrity, extracting sensitive information, or modifying data.

Critical Impact

Authenticated attackers can remotely exploit this SQL Injection vulnerability to read, modify, or delete database content, potentially gaining access to sensitive API documentation and user credentials stored within ShowDoc instances.

Affected Products

  • star7th ShowDoc up to version 2.10.10
  • star7th ShowDoc up to version 3.6.2
  • star7th ShowDoc up to version 3.8.0

Discovery Timeline

  • 2026-04-25 - CVE-2026-6982 published to NVD
  • 2026-04-27 - Last updated in NVD database

Technical Details for CVE-2026-6982

Vulnerability Analysis

This vulnerability represents a classic SQL Injection flaw (CWE-74: Injection) in the ShowDoc application's page sorting functionality. The affected component is the PageController.class.PHP file within the API module, which handles requests to sort documentation pages. When processing the pages parameter, the application fails to properly sanitize or parameterize user input before incorporating it into SQL queries.

The attack requires low-level authentication (a valid user account), but can be executed remotely over the network with minimal complexity. Successful exploitation could allow attackers to extract sensitive data from the database, modify or delete documentation content, or potentially escalate privileges depending on the database configuration and permissions.

The vendor has released version 3.8.1 to address this vulnerability but has explicitly stated they will not backport patches to older affected versions (2.10.10, 3.6.2, and prior releases in the 3.x branch before 3.8.1).

Root Cause

The root cause of this vulnerability is improper input validation and lack of parameterized queries in the PageController.class.PHP file. The pages argument is passed directly into SQL queries without adequate sanitization, escaping, or use of prepared statements. This allows attackers to break out of the intended query structure and inject arbitrary SQL commands.

Attack Vector

The attack vector is network-based, requiring an authenticated user to send a specially crafted request to the API Page Sort Endpoint. The attacker manipulates the pages parameter to include SQL injection payloads. Since the vulnerability requires authentication but only low-level privileges, any registered user of a ShowDoc instance could potentially exploit this flaw.

The exploitation does not require user interaction beyond the initial authenticated request. An attacker would typically craft a malicious HTTP request to the sorting endpoint, embedding SQL syntax within the pages parameter to extract database contents using techniques such as UNION-based injection, blind boolean-based injection, or time-based blind injection depending on the application's error handling and response characteristics.

For technical proof-of-concept details, refer to the GitHub Gist PoC published by the security researcher.

Detection Methods for CVE-2026-6982

Indicators of Compromise

  • Unusual or malformed requests to /api/page/sort or similar page sorting endpoints containing SQL syntax characters such as single quotes, semicolons, or UNION keywords
  • Database query logs showing unexpected SQL statements originating from the PageController component
  • Error logs containing SQL syntax errors or database exceptions from the affected endpoint
  • Unexpected data extraction or modification in documentation pages or user tables

Detection Strategies

  • Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns in requests to ShowDoc API endpoints
  • Monitor application logs for anomalous requests containing SQL injection signatures targeting the pages parameter
  • Deploy runtime application self-protection (RASP) solutions to detect SQL injection attempts at the application layer
  • Review database audit logs for unauthorized SELECT, UPDATE, or DELETE operations

Monitoring Recommendations

  • Enable detailed logging for all API requests to the ShowDoc application, particularly the Page Sort endpoint
  • Configure alerting for SQL error messages in application logs that may indicate injection attempts
  • Monitor database query performance for unusual patterns that could indicate time-based blind SQL injection probing
  • Implement network traffic analysis to detect outbound data exfiltration following potential exploitation

How to Mitigate CVE-2026-6982

Immediate Actions Required

  • Upgrade ShowDoc to version 3.8.1 or later immediately to remediate this vulnerability
  • If running version 2.10.10, 3.6.2, or any version before 3.8.1, plan migration to the latest release as no backported patches will be provided
  • Implement Web Application Firewall rules to filter SQL injection attempts as a temporary mitigation
  • Review user accounts and remove any unnecessary or suspicious accounts to reduce attack surface

Patch Information

The vulnerability has been addressed in ShowDoc version 3.8.1. Users should upgrade to this version or later to remediate the SQL injection flaw. The patch is available through the official GitHub Release v3.8.1.

According to the security researcher, the vendor has explicitly stated they will not backport patches to older affected versions. Organizations running versions 2.10.10, 3.6.2, or other pre-3.8.1 releases must upgrade to version 3.8.1 or implement compensating controls.

For additional vulnerability details, consult VulDB #359525 and VulDB CTI information.

Workarounds

  • Deploy a Web Application Firewall (WAF) configured to block requests containing SQL injection patterns targeting the pages parameter
  • Restrict network access to the ShowDoc instance to trusted IP ranges only
  • Implement input validation at the reverse proxy or load balancer level to sanitize the pages parameter before it reaches the application
  • Consider disabling the page sorting functionality if it is not critical to operations until upgrade can be performed
bash
# Example: Nginx WAF configuration to block SQL injection patterns
# Add to nginx server configuration for ShowDoc
location /api/ {
    # Block common SQL injection patterns
    if ($args ~* "(union|select|insert|update|delete|drop|--|;|')" ) {
        return 403;
    }
    proxy_pass http://showdoc_backend;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeSQLI

  • Vendor/TechShowdoc

  • SeverityMEDIUM

  • CVSS Score5.3

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-74
  • Technical References
  • GitHub Gist PoC

  • GitHub Release v3.8.1

  • VulDB Submission #795528

  • VulDB #359525

  • VulDB #359525 CTI
  • Related CVEs
  • CVE-2025-0520: ShowDoc File Upload RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English