CVE-2019-25672

HIGH

PilusCart 1.4.1 SQL Injection via send Parameter

Title source: cna
STIX 2.1

Description

PilusCart 1.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter. Attackers can submit POST requests to the comment submission endpoint with RLIKE-based boolean SQL injection payloads to extract sensitive database information.

Exploits (1)

exploitdb WORKING POC
by Mehmet EMIROGLU · textwebappsphp
https://www.exploit-db.com/exploits/46368

References (3)

Core 3
Core References
Exploit exploit
ExploitDB-46368
https://www.exploit-db.com/exploits/46368
Product product
Official Product Homepage
https://sourceforge.net/projects/pilus/
Third Party Advisory third-party-advisory
VulnCheck Advisory: PilusCart 1.4.1 SQL Injection via send Parameter
https://www.vulncheck.com/advisories/piluscart-sql-injection-via-send-parameter

Scores

CVSS v3 8.2
EPSS 0.0002
EPSS Percentile 6.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-89
Status published
Products (2)
kartatopia/piluscart 1.4.1
pilus/PilusCart 1.4.1
Published Apr 05, 2026
Tracked Since Apr 06, 2026