VYPR
High severity8.2NVD Advisory· Published Feb 22, 2026· Updated Apr 15, 2026

CVE-2019-25446

CVE-2019-25446

Description

DIGIT CENTRIS ERP contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the datum1, datum2, KID, and PID parameters. Attackers can send POST requests to /korisnikinfo.php with malicious SQL syntax in these parameters to extract or modify sensitive database information.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated SQL injection in DIGIT CENTRIS ERP allows remote attackers to extract or modify database data via POST parameters to /korisnikinfo.php.

Vulnerability

Overview

CVE-2019-25446 describes an SQL injection vulnerability in the DIGIT CENTRIS ERP application. The flaw resides in the /korisnikinfo.php endpoint, where the datum1, datum2, KID, and PID parameters are not sanitized before being used in SQL queries. An unauthenticated attacker can inject arbitrary SQL code by manipulating these parameters in a POST request, as demonstrated by the available exploit proof-of-concept [1].

Exploitation

No authentication is required to reach the vulnerable endpoint. The attacker sends a crafted POST request containing malicious SQL syntax in the parameters. The exploit example shows a simple injection using single-quote characters to break out of the intended query structure [1]. The attack is performed over HTTP POST and does not require any special privileges or network position beyond standard web access.

Impact

Successful exploitation can lead to unauthorized extraction of sensitive database information, including user credentials, business data, and other confidential records. Because the vulnerability allows data modification as well, an attacker could alter or delete critical information stored in the database, potentially compromising data integrity and availability.

Mitigation

As of the time of the public disclosure (September 2019), no vendor patch was available, and the advisory notes that the vulnerability affects every version of DIGIT CENTRIS ERP [1]. Organizations using this software should apply input validation and parameterized queries as a workaround, or limit network access to the application until a security update is provided.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.