VYPR
High severity7.1NVD Advisory· Published Mar 24, 2026· Updated Apr 15, 2026

CVE-2019-25638

CVE-2019-25638

Description

Meeplace Business Review Script contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'id' parameter. Attackers can send GET requests to the addclick.php endpoint with crafted SQL payloads in the 'id' parameter to extract sensitive database information or cause denial of service.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Meeplace Business Review Script is vulnerable to unauthenticated SQL injection via the 'id' parameter in addclick.php, allowing data extraction or denial of service.

Vulnerability

Overview

Meeplace Business Review Script contains an SQL injection vulnerability in the addclick.php endpoint. The id parameter is not properly sanitized before being used in SQL queries, allowing an attacker to inject arbitrary SQL commands. This is a classic CWE-89 vulnerability [1].

Exploitation

An unauthenticated attacker can exploit this vulnerability by sending a crafted GET request to the addclick.php script with a malicious payload in the id parameter. No authentication is required, and the attack can be performed remotely over the network. A proof-of-concept payload uses a time-based blind SQL injection technique with SLEEP() to confirm the vulnerability [2].

Impact

Successful exploitation allows an attacker to execute arbitrary SQL queries against the underlying database. This can lead to extraction of sensitive information (such as user credentials or business data) or cause a denial of service by disrupting database operations. The CVSS v3.1 score is 7.1 (High), with the vector indicating high confidentiality impact and low integrity impact [1]. /a].

Mitigation

As of the publication date, no official patch has been confirmed. Users should apply input validation and parameterized queries to the id parameter in addclick.php. The vendor website (meeplace.com) may provide updates; if the product is end-of-life, migration to an alternative solution is recommended [1][2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.