CVE-2019-25482
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows attackers to access and manipulate the database of the PHP car rental script without needing to log in, simply by sending specially crafted requests with harmful SQL code. As a result, they can extract sensitive information from the database, posing a significant risk to the site's security.
Technical Description
Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kategori_id parameter. Attackers can send POST requests to the endpoint with malicious SQL payloads to extract sensitive database information.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 12, 2026
26 days ago
Last Modified
Mar 17, 2026
21 days ago
Vendor
jettweb
Product
php ready rent a car site script
Related Vulnerabilities
This vulnerability allows attackers to gain full administrative access to the PHP stock news site script without needing a valid username or password. They can exploit this by entering specially crafted input in the login form, which tricks the system into bypassing security checks.
This vulnerability allows attackers to manipulate database queries and extract sensitive information by sending specially crafted requests to a specific page in the Jettweb PHP stock news site script. It requires the attacker to send POST requests with malicious input in a certain parameter, making it possible to execute harmful SQL commands.
This vulnerability allows attackers to send specially crafted requests to a specific page of the Jettweb PHP script, enabling them to access or change sensitive information in the database without needing to log in. The only requirement is that they must be able to send a POST request with malicious code in a specific parameter.
This vulnerability allows attackers to access or change sensitive information in the database by sending specially crafted requests to the script without needing to log in. They can exploit this flaw by manipulating a specific part of the URL, which lets them run harmful SQL commands.
This vulnerability allows attackers to access sensitive information from the database by sending specially crafted requests to the website, specifically through a parameter called gallery_id. The attacker does not need to log in or have any special permissions, making it easy for anyone to exploit this flaw.