PHPads 2.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the bannerID parameter in click.php3. Attackers can submit crafted bannerID values using SQL comment syntax and functions like extractvalue to extract sensitive database information such as the current database name.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/46798 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/phpads-sql-injection-via-clickphp-bannerid | Broken Link |
Configurations
History
09 Mar 2026, 18:02
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Blondish phpads
Blondish |
|
| CPE | cpe:2.3:a:blondish:phpads:2.0:*:*:*:*:*:*:* | |
| References | () https://www.exploit-db.com/exploits/46798 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/phpads-sql-injection-via-clickphp-bannerid - Broken Link |
04 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-04 18:16
Updated : 2026-03-09 18:02
NVD link : CVE-2019-25503
Mitre link : CVE-2019-25503
CVE.ORG link : CVE-2019-25503
JSON object : View
Products Affected
blondish
- phpads
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
