Description
Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the gallery_id parameter. Attackers can send GET requests to gallery.php with malicious gallery_id values using UNION-based SQL injection to extract sensitive database information.
Published: 2026-03-12
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Database Data Exfiltration
Action: Immediate Patch
AI Analysis

Impact

Key detail from CVE description: Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the gallery_id parameter. Attackers can send GET requests to gallery.php with malicious gallery_id values using UNION-based SQL injection to extract sensitive database information. The weakness is identified as CWE-89 and enables broad data exfiltration from the database without requiring prior authentication, but it does not allow arbitrary code execution.

Affected Systems

The affected product is Jettweb’s Hazir Haber Sitesi Scripti version 1, as indicated by the vendor and CPE reference (CPE: cpe:2.3:a:jettweb:php_stock_news_site_script:1:*:*:*:*:*:*:*). No additional version granularity is provided in the CNA data, so the entire V1 release is considered vulnerable. The script is a PHP-based web application, and the gallery.php endpoint is publicly accessible on installations of this script.

Risk and Exploitability

The flaw carries a CVSS score of 8.8, reflecting high severity for confidentiality impact (Score data: CVSS 8.8). EPSS indicates a very low likelihood of exploitation (<1 %), and the vulnerability is not in CISA’s KEV catalog (Score data: EPSS <1 %, KEV: not listed). According to the description, the attack vector is through unauthenticated HTTP GET requests to gallery.php (Inferred attack vector: unauthenticated GET). Since the vulnerability is exploitable with no authentication or privileged context required, the potential impact is significant for organizations running the vulnerable script, though the current exploitation probability is low.

Generated by OpenCVE AI on March 17, 2026 at 20:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website or official channels for an update or patch to fix the SQL injection in gallery.php.
  • Apply any available patch or upgrade to a newer, non‑vulnerable version of Hazir Haber Sitesi Scripti.
  • If a patch is not yet available, restrict web access to gallery.php to authenticated users only, or remove the endpoint from publicly exposed servers.
  • Implement input validation or parameterized queries for the gallery_id parameter to mitigate the injection until a patch is applied.

Generated by OpenCVE AI on March 17, 2026 at 20:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Jettweb php Stock News Site Script
CPEs cpe:2.3:a:jettweb:php_stock_news_site_script:1:*:*:*:*:*:*:*
Vendors & Products Jettweb php Stock News Site Script

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Jettweb
Jettweb hazir Haber Sitesi Scripti
Vendors & Products Jettweb
Jettweb hazir Haber Sitesi Scripti

Thu, 12 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the gallery_id parameter. Attackers can send GET requests to gallery.php with malicious gallery_id values using UNION-based SQL injection to extract sensitive database information.
Title Jettweb PHP Hazir Haber Sitesi Scripti V1 SQL Injection via gallery.php
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Jettweb Hazir Haber Sitesi Scripti Php Stock News Site Script
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-12T18:52:13.608Z

Reserved: 2026-03-12T13:50:57.387Z

Link: CVE-2019-25516

cve-icon Vulnrichment

Updated: 2026-03-12T18:52:09.381Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T16:16:04.250

Modified: 2026-03-17T19:30:15.747

Link: CVE-2019-25516

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:49:26Z

Weaknesses