CVE-2019-25707
Description
eBrigade ERP 4.5 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'id' parameter. Attackers can send GET requests to pdf.php with crafted SQL payloads in the 'id' parameter to extract sensitive database information including table names and schema details.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
eBrigade ERP 4.5 has an authenticated SQL injection in pdf.php via the 'id' parameter, allowing attackers to extract database schema and sensitive data.
Vulnerability
Overview
CVE-2019-25707 is an SQL injection vulnerability in eBrigade ERP version 4.5. The flaw resides in the pdf.php script, where the id parameter is not properly sanitized before being used in SQL queries. The code retrieves the id value from GET or POST requests and passes it through a secure_input() function, but the subsequent explode() call splits the value on commas, and the resulting array elements are used directly in SQL statements without parameterization. This allows an authenticated attacker to inject arbitrary SQL commands [1][2].
Exploitation
An attacker must be authenticated to the eBrigade ERP application. The attack is performed by sending a crafted GET request to pdf.php with a malicious payload in the id parameter. The proof-of-concept demonstrates that the id parameter can contain URL-encoded SQL injection strings that extract database metadata, such as table names and schema information. The attack does not require any special privileges beyond a valid session [1].
Impact
Successful exploitation enables an attacker to execute arbitrary SQL queries against the underlying database. This can lead to the extraction of sensitive information, including database schema details, table names, and potentially user credentials or other confidential data stored in the application's database. The CVSS v3 score of 7.1 (High) reflects the significant confidentiality impact, though integrity and availability impacts are limited [2].
Mitigation
As of the publication date, eBrigade ERP 4.5 is the affected version. Users should upgrade to a patched version if available, or apply input validation and parameterized queries to the id parameter in pdf.php. No official patch has been confirmed, and the vendor may need to address this issue. The vulnerability is publicly documented with a working exploit [1][2].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: =4.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.exploit-db.com/exploits/46117nvdExploitVDB Entry
- www.vulncheck.com/advisories/ebrigade-erp-sql-injection-via-pdf-phpnvdThird Party Advisory
- ebrigade.netnvdProduct
- netcologne.dl.sourceforge.net/project/ebrigade/ebrigade/eBrigade%204.5/ebrigade_4.5.zipnvdProduct
News mentions
0No linked articles in our index yet.