Description
Zeeways Matrimony CMS contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries through the profile_list endpoint. Attackers can inject SQL code via the up_cast, s_mother, and s_religion parameters to extract sensitive database information using time-based or error-based techniques.
Published: 2026-03-24
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive data disclosure
Action: Assess Impact
AI Analysis

Impact

Unvalidated user input in the profile_list endpoint of Zeeways Matrimony CMS permits an unauthenticated attacker to inject arbitrary SQL via the up_cast, s_mother, and s_religion parameters. This flaw enables extraction of confidential database contents through time‑based or error‑based techniques, allowing the attacker to read sensitive information such as user credentials, personal data, and other confidential records. The weakness represents a classic SQL injection (CWE‑89) that directly compromises data confidentiality.

Affected Systems

The vulnerability affects Zeeways Matrimony CMS provided by Zeeways. Documentation does not specify any restricted product versions, indicating that all installations exposing the profile_list endpoint are potentially vulnerable. Administrators should verify whether their system uses this module and whether any mitigations were applied by the vendor.

Risk and Exploitability

With a CVSS score of 8.8, the flaw is considered high severity. No EPSS score is listed, but the vulnerability is publicly known, and the exploit is straightforward: an unauthenticated web request to the site can trigger the injection without additional permissions or complex setup. The attack vector is inferred to be remote over the network, as the endpoint is exposed via HTTP. Because the flaw is not listed in KEV, the exploitation level might still be low, yet the inherent confidentiality risk and ease of exploitation warrant immediate attention.

Generated by OpenCVE AI on March 24, 2026 at 12:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply any vendor‑released patch or update for Zeeways Matrimony CMS that addresses the profile_list injection flaw.
  • If no patch is available, restrict network access to the profile_list endpoint by firewall rules or IP whitelisting to limit potential attackers.
  • Implement input validation or parameterized queries to eliminate unsanitized SQL concatenation in the affected code paths.
  • Deploy a web application firewall with rules tuned to detect and block SQL injection patterns targeting these parameters.
  • Monitor incoming traffic and application logs for signs of injection attempts and conduct regular vulnerability scans.

Generated by OpenCVE AI on March 24, 2026 at 12:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Zeeways matrimony Cms
CPEs cpe:2.3:a:zeeways:matrimony_cms:-:*:*:*:*:*:*:*
Vendors & Products Zeeways matrimony Cms

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Zeeways
Zeeways zeeways Matrimony Cms
Vendors & Products Zeeways
Zeeways zeeways Matrimony Cms

Tue, 24 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 11:45:00 +0000

Type Values Removed Values Added
Description Zeeways Matrimony CMS contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries through the profile_list endpoint. Attackers can inject SQL code via the up_cast, s_mother, and s_religion parameters to extract sensitive database information using time-based or error-based techniques.
Title Zeeways Matrimony CMS Lastest SQL Injection via profile_list
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Zeeways Matrimony Cms Zeeways Matrimony Cms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-24T15:12:08.631Z

Reserved: 2026-03-24T11:03:00.169Z

Link: CVE-2019-25635

cve-icon Vulnrichment

Updated: 2026-03-24T14:09:28.520Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T12:16:04.203

Modified: 2026-04-15T15:31:48.937

Link: CVE-2019-25635

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:39:36Z

Weaknesses