Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 17 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Montala
Montala resourcespace |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:montala:resourcespace:8.6:*:*:*:*:*:*:* | |
| Vendors & Products |
Montala
Montala resourcespace |
Mon, 13 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Resourcespace
Resourcespace resourcespace |
|
| Vendors & Products |
Resourcespace
Resourcespace resourcespace |
Sun, 12 Apr 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ResourceSpace 8.6 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the keywords parameter in collection_edit.php. Attackers can submit POST requests with crafted SQL payloads in the keywords field to extract sensitive database information including schema names, user credentials, and other confidential data. | |
| Title | ResourceSpace 8.6 SQL Injection via collection_edit.php | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-13T15:36:40.688Z
Reserved: 2026-04-05T15:33:50.051Z
Link: CVE-2019-25693
Updated: 2026-04-13T15:36:16.672Z
Status : Analyzed
Published: 2026-04-12T13:16:32.270
Modified: 2026-04-17T16:37:04.143
Link: CVE-2019-25693
No data.
OpenCVE Enrichment
Updated: 2026-04-18T17:30:05Z