CVE-2019-25684

HIGH

OpenDocMan 1.3.4 SQL Injection via where Parameter

Title source: cna
STIX 2.1

Description

OpenDocMan 1.3.4 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'where' parameter. Attackers can send GET requests to search.php with malicious SQL payloads in the 'where' parameter to extract sensitive database information.

Exploits (1)

exploitdb WORKING POC
by Mehmet EMIROGLU · textwebappsphp
https://www.exploit-db.com/exploits/46500

References (3)

Core 3
Core References
Exploit exploit
ExploitDB-46500
https://www.exploit-db.com/exploits/46500
Product product
Official Product Homepage
https://sourceforge.net/projects/opendocman/files/
Third Party Advisory third-party-advisory
VulnCheck Advisory: OpenDocMan 1.3.4 SQL Injection via where Parameter
https://www.vulncheck.com/advisories/opendocman-sql-injection-via-where-parameter

Scores

CVSS v3 8.2
EPSS 0.0008
EPSS Percentile 23.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-89
Status published
Products (2)
opendocman/opendocman < 1.3.4
opendocman/OpenDocMan 1.3.4
Published Apr 05, 2026
Tracked Since Apr 06, 2026