Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the location parameter. Attackers can send POST requests to the search/searchdetailed endpoint with malicious SQL payloads in the location field to extract sensitive data or modify database contents.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/46630 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/inout-easyrooms-ultimate-edition-sql-injection-via-search | Third Party Advisory |
Configurations
History
19 Mar 2026, 16:24
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Inoutscripts
Inoutscripts inout Homestay |
|
| References | () https://www.exploit-db.com/exploits/46630 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/inout-easyrooms-ultimate-edition-sql-injection-via-search - Third Party Advisory | |
| CPE | cpe:2.3:a:inoutscripts:inout_homestay:1.0:*:*:*:ultimate:*:*:* | |
| Summary |
|
12 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-12 16:16
Updated : 2026-03-19 16:24
NVD link : CVE-2019-25526
Mitre link : CVE-2019-25526
CVE.ORG link : CVE-2019-25526
JSON object : View
Products Affected
inoutscripts
- inout_homestay
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
