Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sitzungsdienst
Sitzungsdienst sd.net Rim |
|
| Vendors & Products |
Sitzungsdienst
Sitzungsdienst sd.net Rim |
Wed, 18 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SD.NET RIM versions before 4.7.3c contain a SQL injection vulnerability that allows attackers to inject malicious SQL statements through POST parameters 'idtyp' and 'idgremium'. Attackers can exploit this vulnerability by crafting specially formed POST requests to the /vorlagen/ endpoint, enabling unauthorized database manipulation and potential information disclosure. | |
| Title | SD.NET RIM 4.7.3c - 'idtyp' SQL Injection | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-19T20:09:53.575Z
Reserved: 2026-02-13T17:37:10.778Z
Link: CVE-2019-25359
Updated: 2026-02-19T20:04:13.648Z
Status : Deferred
Published: 2026-02-18T22:16:21.357
Modified: 2026-04-15T00:35:42.020
Link: CVE-2019-25359
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:10:44Z