Acunetix 360 detected the Database User Has Admin Privileges.

This issue has been confirmed by checking the connection privileges via an identified SQL injection vulnerability in the application.


This can allow an attacker to gain extra privileges via SQL injection attacks. Here is the list of attacks that the attacker might carry out:
  • Gain full access to the database server.
  • Gain a reverse shell to the database server and execute commands on the underlying operating system.
  • Access the database with full permissions, where it may be possible to read, update or delete arbitrary data from the database.
  • Depending on the platform and the database system user, an attacker might carry out a privilege escalation attack to gain administrator access to the target system.


Create a database user with the least possible permissions for your application and connect to the database with that user. Always follow the principle of providing the least privileges for all users and applications.




PCI v3.2-6.5.6 CWE-267 ISO27001-A.9.2.2 WASC-14 OWASP 2013-A5 OWASP 2017-A6 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H