Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 17 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Myt Project
Myt Project myt |
|
| CPEs | cpe:2.3:a:myt_project:myt:1.5.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Myt Project
Myt Project myt |
Mon, 13 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Myt
Myt project Management |
|
| Vendors & Products |
Myt
Myt project Management |
Sun, 12 Apr 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MyT-PM 1.5.1 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the Charge[group_total] parameter. Attackers can submit crafted POST requests to the /charge/admin endpoint with error-based, time-based blind, or stacked query payloads to extract sensitive database information or manipulate data. | |
| Title | MyT-PM 1.5.1 SQL Injection via Charge[group_total] Parameter | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-13T17:28:06.510Z
Reserved: 2026-04-12T12:21:48.260Z
Link: CVE-2019-25713
Updated: 2026-04-13T17:28:02.413Z
Status : Analyzed
Published: 2026-04-12T13:16:34.620
Modified: 2026-04-17T14:04:08.673
Link: CVE-2019-25713
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:54:06Z