CVE-2019-25713

MyT-PM 1.5.1 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the Charge[group_total] parameter. Attackers can submit crafted POST requests to the /charge/admin endpoint with error-based, time-based blind, or stacked query payloads to extract sensitive database information or manipulate data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:myt_project:myt:1.5.1:*:*:*:*:*:*:*

History

17 Apr 2026, 14:04

Type Values Removed Values Added
References () https://manageyourteam.net/ - () https://manageyourteam.net/ - Broken Link
References () https://sourceforge.net/projects/myt/ - () https://sourceforge.net/projects/myt/ - Product
References () https://www.exploit-db.com/exploits/46084 - () https://www.exploit-db.com/exploits/46084 - Exploit, VDB Entry
References () https://www.vulncheck.com/advisories/myt-pm-sql-injection-via-charge-group-total-parameter - () https://www.vulncheck.com/advisories/myt-pm-sql-injection-via-charge-group-total-parameter - Third Party Advisory
CPE cpe:2.3:a:myt_project:myt:1.5.1:*:*:*:*:*:*:*
First Time Myt Project
Myt Project myt

12 Apr 2026, 13:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-12 13:16

Updated : 2026-04-17 14:04


NVD link : CVE-2019-25713

Mitre link : CVE-2019-25713

CVE.ORG link : CVE-2019-25713


JSON object : View

Products Affected

myt_project

  • myt
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')