Description
Netartmedia PHP Dating Site contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the Email parameter. Attackers can send POST requests to loginaction.php with time-based SQL injection payloads in the Email field to extract sensitive database information.
Published: 2026-03-12
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Data Exfiltration via Unauthenticated SQL Injection
Action: Assess Impact
AI Analysis

Impact

The Netartmedia PHP Dating Site is vulnerable to a classic SQL injection flaw in the Email parameter of loginaction.php. An attacker can send specially crafted POST requests containing time‑based SQL injection payloads to the Email field, causing the application to execute arbitrary SQL code stored on the database. This flaw allows the attacker to read sensitive data from the database, thereby compromising confidentiality of user records. The vulnerability maps to CWE‑89 (SQL Injection) and carries a CVSS score of 8.8, indicating a high impact security weakness.

Affected Systems

The affected product is Netartmedia Php Dating Site. No specific version numbers are provided in the publicly available data, so any installation of the Netartmedia PHP Dating Site that includes the loginaction.php endpoint is potentially vulnerable unless the application has been updated or patched after the disclosure.

Risk and Exploitability

The environmental EPSS score is reported to be less than 1%, suggesting that exploitation in the wild may be rare, and the vulnerability is not currently listed in the CISA KEV catalog. Nevertheless, the attack vector is straightforward: unauthenticated users can issue standard HTTP POST requests to the exposed loginaction.php page. Because the payload can be delivered over the public network without prior authentication, the risk to sensitive user data is high for any site that remains accessible and unpatched. The high CVSS score underscores the severity of potential data loss if exploited.

Generated by OpenCVE AI on March 18, 2026 at 14:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website or security advisories for an official patch or update
  • If a patch is not yet available, restrict network access to the loginaction.php endpoint using firewall rules or web‑application‑gateway rules
  • Implement server‑side input validation and switch to parameterized database queries for all user‑supplied fields
  • Regularly monitor database logs for anomalous query patterns indicating injection attempts
  • Consider disabling or securing the registration and login features if they are not essential to business operations

Generated by OpenCVE AI on March 18, 2026 at 14:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Netartmedia
Netartmedia php Dating Site
Vendors & Products Netartmedia
Netartmedia php Dating Site

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description Netartmedia PHP Dating Site contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the Email parameter. Attackers can send POST requests to loginaction.php with time-based SQL injection payloads in the Email field to extract sensitive database information.
Title Netartmedia PHP Dating Site SQL Injection via loginaction.php
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Netartmedia Php Dating Site
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-12T16:28:33.701Z

Reserved: 2026-03-12T14:25:01.163Z

Link: CVE-2019-25535

cve-icon Vulnrichment

Updated: 2026-03-12T16:28:23.866Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-12T16:16:07.757

Modified: 2026-03-12T21:07:53.427

Link: CVE-2019-25535

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:49:10Z

Weaknesses