CVE-2019-25506

FreeSMS 2.1.2 contains a boolean-based blind SQL injection vulnerability in the password parameter that allows unauthenticated attackers to bypass authentication by injecting SQL code through the login endpoint. Attackers can exploit the vulnerable password parameter in requests to /pages/crc_handler.php?method=login to authenticate as any known user and subsequently modify their password via the profile update function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freesms_project:freesms:*:*:*:*:*:*:*:*

History

09 Mar 2026, 17:55

Type Values Removed Values Added
CPE cpe:2.3:a:freesms_project:freesms:*:*:*:*:*:*:*:*
First Time Freesms Project freesms
Freesms Project
References () https://www.exploit-db.com/exploits/46658 - () https://www.exploit-db.com/exploits/46658 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/freesms-authentication-bypass-via-sql-injection - () https://www.vulncheck.com/advisories/freesms-authentication-bypass-via-sql-injection - Third Party Advisory

04 Mar 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-04 18:16

Updated : 2026-03-09 17:55


NVD link : CVE-2019-25506

Mitre link : CVE-2019-25506

CVE.ORG link : CVE-2019-25506


JSON object : View

Products Affected

freesms_project

  • freesms
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')