Tradebox 5.4 contains an SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the symbol parameter. Attackers can send POST requests to the monthly_deposit endpoint with malicious symbol values using boolean-based blind, time-based blind, error-based, or union-based SQL injection techniques to extract sensitive database information.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/46671 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/tradebox-sql-injection-via-symbol-parameter | Third Party Advisory |
Configurations
History
09 Mar 2026, 17:57
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Bdtask
Bdtask tradebox |
|
| References | () https://www.exploit-db.com/exploits/46671 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/tradebox-sql-injection-via-symbol-parameter - Third Party Advisory | |
| CPE | cpe:2.3:a:bdtask:tradebox:5.4:*:*:*:*:*:*:* |
04 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-04 18:16
Updated : 2026-03-09 17:57
NVD link : CVE-2019-25505
Mitre link : CVE-2019-25505
CVE.ORG link : CVE-2019-25505
JSON object : View
Products Affected
bdtask
- tradebox
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
