CVE-2019-25699

Newsbull Haber Script 1.0.0 contains multiple SQL injection vulnerabilities in the search parameter that allow authenticated attackers to extract database information through time-based, blind, and boolean-based injection techniques. Attackers can inject malicious SQL code through the search parameter in endpoints like /admin/comment/records, /admin/category/records, /admin/news/records, and /admin/menu/childs to manipulate database queries and retrieve sensitive data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gurkanuzunca:newsbull:1.0.0:*:*:*:*:*:*:*

History

17 Apr 2026, 16:43

Type Values Removed Values Added
First Time Gurkanuzunca
Gurkanuzunca newsbull
CPE cpe:2.3:a:gurkanuzunca:newsbull:1.0.0:*:*:*:*:*:*:*
References () http://newsbull.org/ - () http://newsbull.org/ - Broken Link
References () https://github.com/gurkanuzunca/newsbull - () https://github.com/gurkanuzunca/newsbull - Product
References () https://www.exploit-db.com/exploits/46266 - () https://www.exploit-db.com/exploits/46266 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/newsbull-haber-script-authenticated-sql-injection-via-search-parameter - () https://www.vulncheck.com/advisories/newsbull-haber-script-authenticated-sql-injection-via-search-parameter - Third Party Advisory

12 Apr 2026, 13:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-12 13:16

Updated : 2026-04-17 16:43


NVD link : CVE-2019-25699

Mitre link : CVE-2019-25699

CVE.ORG link : CVE-2019-25699


JSON object : View

Products Affected

gurkanuzunca

  • newsbull
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')