OpenDocMan 1.3.4 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'where' parameter. Attackers can send GET requests to search.php with malicious SQL payloads in the 'where' parameter to extract sensitive database information.
References
| Link | Resource |
|---|---|
| https://sourceforge.net/projects/opendocman/files/ | Product |
| https://www.exploit-db.com/exploits/46500 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/opendocman-sql-injection-via-where-parameter | Third Party Advisory |
Configurations
History
09 Apr 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:opendocman:opendocman:*:*:*:*:*:*:*:* | |
| First Time |
Opendocman opendocman
Opendocman |
|
| References | () https://sourceforge.net/projects/opendocman/files/ - Product | |
| References | () https://www.exploit-db.com/exploits/46500 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/opendocman-sql-injection-via-where-parameter - Third Party Advisory |
05 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-05 21:16
Updated : 2026-04-09 19:16
NVD link : CVE-2019-25684
Mitre link : CVE-2019-25684
CVE.ORG link : CVE-2019-25684
JSON object : View
Products Affected
opendocman
- opendocman
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
