e107 contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the e107_admin/download.php script not properly sanitizing user-supplied input to the 'download_url', 'download_url_extended', 'download_author_email', 'download_author_website', 'download_image', 'download_thumb', 'download_visible', or 'download_class' parameters. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data.