CVE-2019-25672 PUBLISHED

PilusCart 1.4.1 SQL Injection via send Parameter

Assigner: VulnCheck
Reserved: 05.04.2026 Published: 05.04.2026 Updated: 05.04.2026

PilusCart 1.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter. Attackers can submit POST requests to the comment submission endpoint with RLIKE-based boolean SQL injection payloads to extract sensitive database information.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.8

Product Status

Vendor pilus
Product PilusCart
Versions
  • Version 1.4.1 is affected

Credits

  • Mehmet EMIROGLU finder

References

Problem Types

  • Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE