ResourceSpace 8.6 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the keywords parameter in collection_edit.php. Attackers can submit POST requests with crafted SQL payloads in the keywords field to extract sensitive database information including schema names, user credentials, and other confidential data.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/46274 | Exploit VDB Entry |
| https://www.resourcespace.com/ | Product |
| https://www.resourcespace.com/get | Product |
| https://www.vulncheck.com/advisories/resourcespace-sql-injection-via-collection-edit-php | Third Party Advisory |
Configurations
History
17 Apr 2026, 16:37
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Montala
Montala resourcespace |
|
| CWE | CWE-89 | |
| CPE | cpe:2.3:a:montala:resourcespace:8.6:*:*:*:*:*:*:* | |
| References | () https://www.exploit-db.com/exploits/46274 - Exploit, VDB Entry | |
| References | () https://www.resourcespace.com/ - Product | |
| References | () https://www.resourcespace.com/get - Product | |
| References | () https://www.vulncheck.com/advisories/resourcespace-sql-injection-via-collection-edit-php - Third Party Advisory |
12 Apr 2026, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-12 13:16
Updated : 2026-04-17 16:37
NVD link : CVE-2019-25693
Mitre link : CVE-2019-25693
CVE.ORG link : CVE-2019-25693
JSON object : View
Products Affected
montala
- resourcespace
