In Sentrifugo 3.2, admin can edit employeeβs informations via this endpoint β> /sentrifugo/index.php/empadditionaldetails/edit/userid/2. In this POST request, βemployeeNumIdβ parameter is affected by SQLi vulnerability. Attacker can inject SQL commands into query, read data from database or write data into the database.