CVE-2019-25713
HIGHMyT-PM 1.5.1 SQL Injection via Charge[group_total] Parameter
Title source: cnaDescription
MyT-PM 1.5.1 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the Charge[group_total] parameter. Attackers can submit crafted POST requests to the /charge/admin endpoint with error-based, time-based blind, or stacked query payloads to extract sensitive database information or manipulate data.
Exploits (1)
References (4)
Core 4
Core References
Third Party Advisory third-party-advisory
VulnCheck Advisory: MyT-PM 1.5.1 SQL Injection via Charge[group_total] Parameter
https://www.vulncheck.com/advisories/myt-pm-sql-injection-via-charge-group-total-parameter
Scores
CVSS v3
7.1
EPSS
0.0003
EPSS Percentile
8.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-89
Status
published
Products (2)
MyT/Project Management
1.5.1
myt_project/myt
1.5.1
Published
Apr 12, 2026
Tracked Since
Apr 12, 2026