High severity8.2NVD Advisory· Published Apr 5, 2026· Updated Apr 9, 2026
CVE-2019-25672
CVE-2019-25672
Description
PilusCart 1.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter. Attackers can submit POST requests to the comment submission endpoint with RLIKE-based boolean SQL injection payloads to extract sensitive database information.
Affected products
1- cpe:2.3:a:kartatopia:piluscart:1.4.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.exploit-db.com/exploits/46368nvdExploitVDB Entry
- www.vulncheck.com/advisories/piluscart-sql-injection-via-send-parameternvdThird Party Advisory
- sourceforge.net/projects/pilus/nvdProduct
News mentions
0No linked articles in our index yet.