CVE-2019-25459
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows attackers to manipulate database queries on the Web Ofisi Emlak platform, enabling them to access sensitive information or execute harmful commands without needing to log in. It can be exploited by sending specially crafted requests with specific parameters, making it a serious risk for any site using this software.
Technical Description
Web Ofisi Emlak V2 contains multiple SQL injection vulnerabilities in the endpoint that allow unauthenticated attackers to manipulate database queries through GET parameters. Attackers can inject SQL code into parameters like emlak_durumu, emlak_tipi, il, ilce, kelime, and semt to extract sensitive database information or perform time-based blind SQL injection attacks.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 22, 2026
about 1 month ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
web-ofisi
Product
emlak
Related Vulnerabilities
This vulnerability allows attackers to access sensitive information from the database by sending specially crafted requests to a specific endpoint without needing to log in. They can exploit this flaw by injecting harmful SQL code through a search parameter, making it possible to retrieve data that should be protected.
This vulnerability allows attackers to access sensitive information from the database by sending specially crafted requests to the web application without needing to log in. It specifically targets the 'q' parameter in search queries, enabling attackers to manipulate the database and extract data using time-based techniques.
This vulnerability allows attackers to access and manipulate the database of the Web Ofisi Firma Rehberi application without needing to log in, simply by sending specially crafted requests with malicious code in certain URL parameters. If exploited, attackers can extract sensitive information from the database or execute harmful commands, posing a significant risk to the application's data security.
This vulnerability allows attackers to access sensitive information from the database by sending specially crafted requests to the web application without needing to log in. They can exploit this flaw by manipulating a specific parameter in the URL, making it possible to extract data through clever SQL code injections.
This vulnerability allows attackers to access and manipulate the database of the Web Ofisi Emlak application without needing to log in, simply by sending specially crafted requests through a specific URL parameter. By exploiting this flaw, they can extract sensitive information or even disrupt the service, making it critical for users to secure their systems.