CVE-2019-25498

Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the landing_location parameter. Attackers can send POST requests to the searched endpoint with malicious SQL payloads to bypass authentication and extract sensitive database information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:simplejobscript:simplejobscript:*:*:*:*:*:*:*:*

History

06 Mar 2026, 20:50

Type Values Removed Values Added
First Time Simplejobscript
Simplejobscript simplejobscript
CPE cpe:2.3:a:simplejobscript:simplejobscript:*:*:*:*:*:*:*:*
References () https://www.exploit-db.com/exploits/46612 - () https://www.exploit-db.com/exploits/46612 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/simple-job-script-sql-injection-via-searched-endpoint - () https://www.vulncheck.com/advisories/simple-job-script-sql-injection-via-searched-endpoint - Third Party Advisory

04 Mar 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-04 18:16

Updated : 2026-03-06 20:50


NVD link : CVE-2019-25498

Mitre link : CVE-2019-25498

CVE.ORG link : CVE-2019-25498


JSON object : View

Products Affected

simplejobscript

  • simplejobscript
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')