Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 16 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Konradpl99
Konradpl99 202cms |
|
| CPEs | cpe:2.3:a:konradpl99:202cms:10.0:beta:*:*:*:*:*:* | |
| Vendors & Products |
Konradpl99
Konradpl99 202cms |
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sourceforge
Sourceforge 202cms |
|
| Vendors & Products |
Sourceforge
Sourceforge 202cms |
Thu, 12 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | 202CMS v10 beta contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the log_user parameter. Attackers can send crafted requests with malicious SQL statements in the log_user field to extract sensitive database information or modify database contents. | |
| Title | 202CMS v10 beta SQL Injection via log_user Parameter | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-12T16:20:14.733Z
Reserved: 2026-03-12T14:26:15.503Z
Link: CVE-2019-25538
Updated: 2026-03-12T16:20:04.217Z
Status : Analyzed
Published: 2026-03-12T16:16:08.400
Modified: 2026-03-16T17:53:57.243
Link: CVE-2019-25538
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:49:07Z