CVE-2019-25639
Description
Matrimony Website Script M-Plus contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries by injecting SQL code through various POST parameters. Attackers can inject malicious SQL payloads into parameters like txtGender, religion, Fage, and cboCountry across simplesearch_results.php, advsearch_results.php, specialcase_results.php, locational_results.php, and registration2.php to extract sensitive database information or execute arbitrary SQL commands.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unauthenticated SQL injection in Matrimony Website Script M-Plus via multiple POST parameters allows attackers to execute arbitrary SQL commands.
Vulnerability
Overview
Matrimony Website Script M-Plus contains multiple unauthenticated SQL injection vulnerabilities [1]. The application fails to sanitize user-supplied input passed through POST parameters such as txtGender, religion, Fage, and cboCountry. An attacker can inject malicious SQL payloads into these parameters across several PHP scripts, including simplesearch_results.php, advsearch_results.php, specialcase_results.php, locational_results.php, and registration2.php [2].
Exploitation
Details
Exploitation requires no authentication; an attacker can send crafted POST requests to any of the vulnerable endpoints. Proof-of-concept payloads demonstrate that time-based boolean blind SQL injection is achievable, for example by appending OR 3*2*1=6 AND 000715=000715 -- to the txtGender parameter [2]. The attacker can also use sleep-based techniques to extract data or execute arbitrary statements.
Impact
Successful exploitation allows an unauthenticated attacker to extract sensitive database contents, including user credentials and personal profile information. In some scenarios, the attacker may be able to execute arbitrary SQL commands, potentially leading to full compromise of the underlying database and server.
Mitigation
Status
As of the publication date, the vendor's website indicates the product is actively marketed [1]. No official patch or advisory has been published by the vendor for this version (M-Plus). Users should consider applying web application firewall rules to block malicious SQL injection patterns or upgrade to a patched version if one becomes available. The vulnerability has not been listed in CISA's Known Exploited Vulnerabilities (KEV) catalog as of March 2026.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.