CVE-2019-25512
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows attackers to inject harmful SQL commands into the database through a specific input field in POST requests, enabling them to steal sensitive information or alter data. To exploit this, the attacker needs to send a specially crafted request that targets the vulnerable script.
Technical Description
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows attackers to inject malicious SQL commands through the kelime parameter in POST requests. Attackers can manipulate the kelime parameter with UNION-based SQL injection payloads to extract sensitive database information or modify database contents.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 12, 2026
26 days ago
Last Modified
Mar 17, 2026
21 days ago
Vendor
jettweb
Product
php stock news site script
Related Vulnerabilities
This vulnerability allows attackers to gain full administrative access to the PHP stock news site script without needing a valid username or password. They can exploit this by entering specially crafted input in the login form, which tricks the system into bypassing security checks.
This vulnerability allows attackers to manipulate database queries and extract sensitive information by sending specially crafted requests to a specific page in the Jettweb PHP stock news site script. It requires the attacker to send POST requests with malicious input in a certain parameter, making it possible to execute harmful SQL commands.
This vulnerability allows attackers to send specially crafted requests to a specific page of the Jettweb PHP script, enabling them to access or change sensitive information in the database without needing to log in. The only requirement is that they must be able to send a POST request with malicious code in a specific parameter.
This vulnerability allows attackers to access or change sensitive information in the database by sending specially crafted requests to the script without needing to log in. They can exploit this flaw by manipulating a specific part of the URL, which lets them run harmful SQL commands.
This vulnerability allows attackers to access sensitive information from the database by sending specially crafted requests to the website, specifically through a parameter called gallery_id. The attacker does not need to log in or have any special permissions, making it easy for anyone to exploit this flaw.