Vulnerability Description
Placeto CMS Alpha rv.4 contains an SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the 'page' parameter. Attackers can send GET requests to the admin/edit.php endpoint with malicious 'page' values using boolean-based blind, time-based blind, or union-based techniques to extract sensitive database information.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://sourceforge.net/projects/placeto/
- https://sourceforge.net/projects/placeto/files/alpha-rv.4/placeto.zip
- https://www.exploit-db.com/exploits/46588
- https://www.vulncheck.com/advisories/placeto-cms-alpha-rv-4-sql-injection-via-pa
FAQ
What is CVE-2019-25529?
CVE-2019-25529 is a vulnerability with a CVSS score of 7.1 (HIGH). Placeto CMS Alpha rv.4 contains an SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the 'page' parameter. Attackers can send...
How severe is CVE-2019-25529?
CVE-2019-25529 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-25529?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.