CVE-2019-25694

HIGH

Kados R10 GreenBee SQL Injection via user2reset

Title source: cna
STIX 2.1

Description

Kados R10 GreenBee contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the user2reset parameter. Attackers can send crafted requests with malicious SQL payloads to extract sensitive database information or modify data.

Exploits (1)

exploitdb WORKING POC
by Mehmet EMIROGLU · textwebappsphp
https://www.exploit-db.com/exploits/46505

References (4)

Core 4
Core References
Exploit exploit
ExploitDB-46505
https://www.exploit-db.com/exploits/46505
Product product
Official Product Homepage
https://www.kados.info/
Product product
Product Reference
https://sourceforge.net/projects/kados/
Third Party Advisory third-party-advisory
VulnCheck Advisory: Kados R10 GreenBee SQL Injection via user2reset
https://www.vulncheck.com/advisories/kados-r10-greenbee-sql-injection-via-user2reset

Scores

CVSS v3 8.2
EPSS 0.0003
EPSS Percentile 7.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-89
Status published
Products (2)
Kados/Kados R10 GreenBee R10 GreenBee
marmotech/kados r10_greenbee
Published Apr 05, 2026
Tracked Since Apr 06, 2026