Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 06 Mar 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Doditsolutions airbnb Clone Script
|
|
| CPEs | cpe:2.3:a:doditsolutions:airbnb_clone_script:4:*:*:*:*:*:*:* | |
| Vendors & Products |
Doditsolutions airbnb Clone Script
|
Mon, 02 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Doditsolutions
Doditsolutions homey Bnb (airbnb Clone Script) |
|
| Vendors & Products |
Doditsolutions
Doditsolutions homey Bnb (airbnb Clone Script) |
Fri, 27 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Homey BNB V4 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the hosting_id parameter. Attackers can send GET requests to the rooms/ajax_refresh_subtotal endpoint with malicious hosting_id values to extract sensitive database information or cause denial of service. | |
| Title | Homey BNB V4 SQL Injection via ajax_refresh_subtotal | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-27T18:28:30.334Z
Reserved: 2026-02-27T16:33:21.104Z
Link: CVE-2019-25489
Updated: 2026-02-27T18:28:25.769Z
Status : Analyzed
Published: 2026-02-27T18:16:03.270
Modified: 2026-03-06T20:56:05.347
Link: CVE-2019-25489
No data.
OpenCVE Enrichment
Updated: 2026-03-02T12:07:05Z