ThinkCMF post[id][1] SQL injection
ThinkCMF X2.2.2 has SQL Injection via the method edit_post in ArticleController.class.php and is exploitable by normal authenticated users via the post[id][1] parameter in an article edit_post action.
ThinkCMF is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements to the ArticleController.class.php script using the post[id][1] parameter in an article edit_post action, which could allow the attacker to view, add, modify or delete information in the back-end database.