VYPR
High severity8.2NVD Advisory· Published Mar 24, 2026· Updated Apr 15, 2026

CVE-2019-25639

CVE-2019-25639

Description

Matrimony Website Script M-Plus contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries by injecting SQL code through various POST parameters. Attackers can inject malicious SQL payloads into parameters like txtGender, religion, Fage, and cboCountry across simplesearch_results.php, advsearch_results.php, specialcase_results.php, locational_results.php, and registration2.php to extract sensitive database information or execute arbitrary SQL commands.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unauthenticated SQL injection in Matrimony Website Script M-Plus via multiple POST parameters allows attackers to execute arbitrary SQL commands.

Vulnerability

Overview

Matrimony Website Script M-Plus contains multiple unauthenticated SQL injection vulnerabilities [1]. The application fails to sanitize user-supplied input passed through POST parameters such as txtGender, religion, Fage, and cboCountry. An attacker can inject malicious SQL payloads into these parameters across several PHP scripts, including simplesearch_results.php, advsearch_results.php, specialcase_results.php, locational_results.php, and registration2.php [2].

Exploitation

Details

Exploitation requires no authentication; an attacker can send crafted POST requests to any of the vulnerable endpoints. Proof-of-concept payloads demonstrate that time-based boolean blind SQL injection is achievable, for example by appending OR 3*2*1=6 AND 000715=000715 -- to the txtGender parameter [2]. The attacker can also use sleep-based techniques to extract data or execute arbitrary statements.

Impact

Successful exploitation allows an unauthenticated attacker to extract sensitive database contents, including user credentials and personal profile information. In some scenarios, the attacker may be able to execute arbitrary SQL commands, potentially leading to full compromise of the underlying database and server.

Mitigation

Status

As of the publication date, the vendor's website indicates the product is actively marketed [1]. No official patch or advisory has been published by the vendor for this version (M-Plus). Users should consider applying web application firewall rules to block malicious SQL injection patterns or upgrade to a patched version if one becomes available. The vulnerability has not been listed in CISA's Known Exploited Vulnerabilities (KEV) catalog as of March 2026.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.