Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:oscommerce:oscommerce:4.0:*:*:*:*:*:*:* |
Wed, 04 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:oscommerce:oscommerce:2.3.4.1:*:*:*:*:*:*:* |
Mon, 02 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oscommerce
Oscommerce oscommerce |
|
| Vendors & Products |
Oscommerce
Oscommerce oscommerce |
Fri, 27 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | osCommerce 2.3.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the reviews_id parameter. Attackers can send GET requests to product_reviews_write.php with malicious reviews_id values using boolean-based SQL injection payloads to extract sensitive database information. | |
| Title | osCommerce 2.3.4.1 SQL Injection via reviews_id Parameter | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:04:44.088Z
Reserved: 2026-02-27T17:17:58.726Z
Link: CVE-2019-25495
Updated: 2026-02-27T18:26:06.061Z
Status : Analyzed
Published: 2026-02-27T18:16:05.487
Modified: 2026-03-04T02:14:42.250
Link: CVE-2019-25495
No data.
OpenCVE Enrichment
Updated: 2026-03-02T12:06:59Z