microASP Portal+ CMS contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the explode_tree parameter. Attackers can send crafted requests to pagina.phtml with SQL injection payloads using extractvalue and concat functions to extract sensitive database information like the current database name.
References
Configurations
No configuration.
History
23 Feb 2026, 18:13
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
22 Feb 2026, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-22 14:15
Updated : 2026-02-23 18:13
NVD link : CVE-2019-25366
Mitre link : CVE-2019-25366
CVE.ORG link : CVE-2019-25366
JSON object : View
Products Affected
No product.
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
