CVE-2019-25693

ResourceSpace 8.6 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the keywords parameter in collection_edit.php. Attackers can submit POST requests with crafted SQL payloads in the keywords field to extract sensitive database information including schema names, user credentials, and other confidential data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:montala:resourcespace:8.6:*:*:*:*:*:*:*

History

17 Apr 2026, 16:37

Type Values Removed Values Added
First Time Montala
Montala resourcespace
CWE CWE-89
CPE cpe:2.3:a:montala:resourcespace:8.6:*:*:*:*:*:*:*
References () https://www.exploit-db.com/exploits/46274 - () https://www.exploit-db.com/exploits/46274 - Exploit, VDB Entry
References () https://www.resourcespace.com/ - () https://www.resourcespace.com/ - Product
References () https://www.resourcespace.com/get - () https://www.resourcespace.com/get - Product
References () https://www.vulncheck.com/advisories/resourcespace-sql-injection-via-collection-edit-php - () https://www.vulncheck.com/advisories/resourcespace-sql-injection-via-collection-edit-php - Third Party Advisory

12 Apr 2026, 13:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-12 13:16

Updated : 2026-04-17 16:37


NVD link : CVE-2019-25693

Mitre link : CVE-2019-25693

CVE.ORG link : CVE-2019-25693


JSON object : View

Products Affected

montala

  • resourcespace
CWE
CWE-352

Cross-Site Request Forgery (CSRF)

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')