Description
PilusCart 1.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter. Attackers can submit POST requests to the comment submission endpoint with RLIKE-based boolean SQL injection payloads to extract sensitive database information.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Sun, 05 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PilusCart 1.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter. Attackers can submit POST requests to the comment submission endpoint with RLIKE-based boolean SQL injection payloads to extract sensitive database information. | |
| Title | PilusCart 1.4.1 SQL Injection via send Parameter | |
| First Time appeared |
Kartatopia
Kartatopia piluscart |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:kartatopia:piluscart:1.4.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Kartatopia
Kartatopia piluscart |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-05T20:45:25.098Z
Reserved: 2026-04-05T13:16:57.228Z
Link: CVE-2019-25672
No data.
Status : Received
Published: 2026-04-05T21:16:44.943
Modified: 2026-04-05T21:16:44.943
Link: CVE-2019-25672
No data.
OpenCVE Enrichment
No data.
Weaknesses