phpWebThings contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'forum.php' script not properly sanitizing user-supplied input to the 'forum' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.
The vendor has discontinued this product and therefore has no patch or upgrade that mitigates this problem as the vendor-supplied link to the patch, also no longer works. It is recommended that an alternate software package be used in its place. A workaround suggesting that the 'magic_quotes_gpc' option in 'php.ini' be set to 'off' has been proposed, however this workaround may work for the part of the exploit involving the 'forum' variable, but exploit code has been released showing that it does not work for the part of this exploit involving the 'msg' variable.