PilusCart 1.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter. Attackers can submit POST requests to the comment submission endpoint with RLIKE-based boolean SQL injection payloads to extract sensitive database information.
References
| Link | Resource |
|---|---|
| https://sourceforge.net/projects/pilus/ | Product |
| https://www.exploit-db.com/exploits/46368 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/piluscart-sql-injection-via-send-parameter | Third Party Advisory |
Configurations
History
09 Apr 2026, 19:37
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://sourceforge.net/projects/pilus/ - Product | |
| References | () https://www.exploit-db.com/exploits/46368 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/piluscart-sql-injection-via-send-parameter - Third Party Advisory | |
| CPE | cpe:2.3:a:kartatopia:piluscart:1.4.1:*:*:*:*:*:*:* | |
| First Time |
Kartatopia
Kartatopia piluscart |
05 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-05 21:16
Updated : 2026-04-09 19:37
NVD link : CVE-2019-25672
Mitre link : CVE-2019-25672
CVE.ORG link : CVE-2019-25672
JSON object : View
Products Affected
kartatopia
- piluscart
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
