CVE-2019-25461
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows attackers to access sensitive information from the database by sending specially crafted requests to a specific endpoint without needing to log in. They can exploit this flaw by injecting harmful SQL code through a search parameter, making it possible to retrieve data that should be protected.
Technical Description
Web Ofisi Platinum E-Ticaret v5 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'q' parameter. Attackers can send POST requests to the ajax/productsFilterSearch endpoint with malicious 'q' values using time-based blind SQL injection techniques to extract sensitive database information.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 22, 2026
about 1 month ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
web-ofisi
Product
ticaret
Related Vulnerabilities
This vulnerability allows attackers to access sensitive information from the database by sending specially crafted requests to the web application without needing to log in. It specifically targets the 'q' parameter in search queries, enabling attackers to manipulate the database and extract data using time-based techniques.
This vulnerability allows attackers to manipulate database queries on the Web Ofisi Emlak platform, enabling them to access sensitive information or execute harmful commands without needing to log in. It can be exploited by sending specially crafted requests with specific parameters, making it a serious risk for any site using this software.
This vulnerability allows attackers to access and manipulate the database of the Web Ofisi Firma Rehberi application without needing to log in, simply by sending specially crafted requests with malicious code in certain URL parameters. If exploited, attackers can extract sensitive information from the database or execute harmful commands, posing a significant risk to the application's data security.
This vulnerability allows attackers to access sensitive information from the database by sending specially crafted requests to the web application without needing to log in. They can exploit this flaw by manipulating a specific parameter in the URL, making it possible to extract data through clever SQL code injections.
This vulnerability allows attackers to access and manipulate the database of the Web Ofisi Emlak application without needing to log in, simply by sending specially crafted requests through a specific URL parameter. By exploiting this flaw, they can extract sensitive information or even disrupt the service, making it critical for users to secure their systems.