CVE-2019-25675

eDirectory contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to bypass administrator authentication and disclose sensitive files by injecting SQL code into parameters. Attackers can exploit the key parameter in the login endpoint with union-based SQL injection to authenticate as administrator, then leverage authenticated file disclosure vulnerabilities in language_file.php to read arbitrary PHP files from the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:arcasolutions:edirectory:*:*:*:*:*:*:*:*

History

20 Apr 2026, 17:56

Type Values Removed Values Added
CPE cpe:2.3:a:arcasolutions:edirectory:*:*:*:*:*:*:*:*
References () https://www.edirectory.com/ - () https://www.edirectory.com/ - Product
References () https://www.exploit-db.com/exploits/46423 - () https://www.exploit-db.com/exploits/46423 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/edirectory-all-versions-sql-injection-authentication-bypass - () https://www.vulncheck.com/advisories/edirectory-all-versions-sql-injection-authentication-bypass - Third Party Advisory
First Time Arcasolutions
Arcasolutions edirectory

05 Apr 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-05 21:16

Updated : 2026-04-20 17:56


NVD link : CVE-2019-25675

Mitre link : CVE-2019-25675

CVE.ORG link : CVE-2019-25675


JSON object : View

Products Affected

arcasolutions

  • edirectory
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')