CVE-2019-25707

HIGH

eBrigade ERP 4.5 SQL Injection via pdf.php

Title source: cna
STIX 2.1

Description

eBrigade ERP 4.5 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'id' parameter. Attackers can send GET requests to pdf.php with crafted SQL payloads in the 'id' parameter to extract sensitive database information including table names and schema details.

Exploits (1)

exploitdb WORKING POC
by Ihsan Sencan · textwebappsphp
https://www.exploit-db.com/exploits/46117

References (4)

Core 4
Core References
Exploit exploit
ExploitDB-46117
https://www.exploit-db.com/exploits/46117
Product product
Official Product Homepage
https://ebrigade.net/
Third Party Advisory third-party-advisory
VulnCheck Advisory: eBrigade ERP 4.5 SQL Injection via pdf.php
https://www.vulncheck.com/advisories/ebrigade-erp-sql-injection-via-pdf-php

Scores

CVSS v3 7.1
EPSS 0.0003
EPSS Percentile 8.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-89
Status published
Products (2)
ebrigade/ebrigade 4.5
Ebrigade/eBrigade ERP 4.5
Published Apr 12, 2026
Tracked Since Apr 12, 2026