CVE-2019-25511
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows attackers to access and extract sensitive information from the database by sending specially crafted requests to a specific script without needing to log in. They can do this by manipulating a parameter in the URL, making it easy for them to steal data if the site is not properly secured.
Technical Description
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the videoid parameter. Attackers can send GET requests to fonksiyonlar.php with malicious videoid values using UNION-based injection to extract sensitive database information.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 12, 2026
26 days ago
Last Modified
Mar 17, 2026
21 days ago
Vendor
jettweb
Product
php stock news site script
Related Vulnerabilities
This vulnerability allows attackers to gain full administrative access to the PHP stock news site script without needing a valid username or password. They can exploit this by entering specially crafted input in the login form, which tricks the system into bypassing security checks.
This vulnerability allows attackers to manipulate database queries and extract sensitive information by sending specially crafted requests to a specific page in the Jettweb PHP stock news site script. It requires the attacker to send POST requests with malicious input in a certain parameter, making it possible to execute harmful SQL commands.
This vulnerability allows attackers to send specially crafted requests to a specific page of the Jettweb PHP script, enabling them to access or change sensitive information in the database without needing to log in. The only requirement is that they must be able to send a POST request with malicious code in a specific parameter.
This vulnerability allows attackers to access or change sensitive information in the database by sending specially crafted requests to the script without needing to log in. They can exploit this flaw by manipulating a specific part of the URL, which lets them run harmful SQL commands.
This vulnerability allows attackers to access sensitive information from the database by sending specially crafted requests to the website, specifically through a parameter called gallery_id. The attacker does not need to log in or have any special permissions, making it easy for anyone to exploit this flaw.