Description
Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting improper SQL query validation. Attackers can submit SQL injection payloads in the username and password fields of the admingiris.php login form to bypass authentication and access the administrative interface.
Published: 2026-03-12
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication bypass leading to administrative access
Action: Apply Patch
AI Analysis

Impact

Key detail from CVE description: Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting improper SQL query validation. The vulnerability is a classic SQL injection where attackers can submit payloads in the username and password fields of admingiris.php, bypassing authentication and obtaining full administrative privileges. This results in the ability to modify content, alter configuration, and potentially compromise site availability and integrity. Reference: https://www.exploit-db.com/exploits/46598

Affected Systems

Affected by the vendor/product Jettweb: Hazir Haber Sitesi Scripti V2 as listed under the CNA. The associated CPE string cpe:2.3:a:jettweb:php_stock_news_site_script:2:*:*:*:*:*:*:* indicates that any minor revision of the major V2 release is vulnerable. No specific sub‑version details are provided, so all 2.x releases should be considered at risk.

Risk and Exploitability

The CVSS score of 8.8 denotes high severity. The EPSS score is below 1%, indicating a low likelihood of current exploitation, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is the publicly exposed web administration login page (admingiris.php), inferred from its description as an externally accessible script. Exploitation requires only basic SQL injection skill, no special network configuration or credentials, and can be performed by any unauthenticated attacker who can reach the login page.

Generated by OpenCVE AI on March 17, 2026 at 22:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • If a vendor‑issued patch or update is available, apply it immediately.
  • If no patch exists, restrict direct access to the admin panel using firewall rules, IP whitelisting, or VPN.
  • Manually sanitize input or replace admingiris.php with parameterized queries to eliminate the SQL injection surface.
  • After applying fixes, verify authentication by testing with both valid and invalid credentials.
  • Continuously monitor web logs for suspicious login attempts and review any changes to the administrative interface.

Generated by OpenCVE AI on March 17, 2026 at 22:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Jettweb php Stock News Site Script
CPEs cpe:2.3:a:jettweb:php_stock_news_site_script:2:*:*:*:*:*:*:*
Vendors & Products Jettweb php Stock News Site Script

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Jettweb
Jettweb hazir Haber Sitesi Scripti
Vendors & Products Jettweb
Jettweb hazir Haber Sitesi Scripti

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting improper SQL query validation. Attackers can submit SQL injection payloads in the username and password fields of the admingiris.php login form to bypass authentication and access the administrative interface.
Title Jettweb PHP Hazir Haber Sitesi Scripti V2 Authentication Bypass
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Jettweb Hazir Haber Sitesi Scripti Php Stock News Site Script
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-12T16:27:47.583Z

Reserved: 2026-03-12T13:45:25.032Z

Link: CVE-2019-25510

cve-icon Vulnrichment

Updated: 2026-03-12T16:27:43.558Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T16:16:03.167

Modified: 2026-03-17T20:04:12.260

Link: CVE-2019-25510

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:49:31Z

Weaknesses