CVE-2019-25713
Description
MyT-PM 1.5.1 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the Charge[group_total] parameter. Attackers can submit crafted POST requests to the /charge/admin endpoint with error-based, time-based blind, or stacked query payloads to extract sensitive database information or manipulate data.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
MyT-PM 1.5.1 is vulnerable to SQL injection via the Charge[group_total] parameter, allowing authenticated attackers to execute arbitrary SQL queries and extract or manipulate database data.
MyT-PM 1.5.1 suffers from a SQL injection vulnerability in the Charge[group_total] parameter of the /charge/admin endpoint [1][2][4]. The application fails to properly sanitize user-supplied input, allowing an attacker to inject arbitrary SQL statements into the database query. This issue affects the project management software MyT (Manage Your Team) [1].
Exploitation requires an authenticated user, as the vulnerable endpoint is part of the administrative interface. An attacker can submit crafted POST requests containing error-based, time-based blind, or stacked query payloads to execute malicious SQL commands [2]. The provided exploit payloads demonstrate these techniques, including the use of EXTRACTVALUE for error-based injection and SLEEP for time-based detection [2].
Successful exploitation allows an attacker to extract sensitive data from the database, such as user credentials or project information, and potentially modify or delete records [2][4]. This could lead to complete compromise of the application’s data integrity and confidentiality.
As of the advisory's publication, no official patch was available, and users were advised to apply input validation or restrict access to affected endpoints [2][4]. The MyT-PM project may no longer be actively maintained, so users should consider migrating to alternative solutions or implementing a web application firewall to mitigate the risk.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2cpe:2.3:a:myt_project:myt:1.5.1:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:myt_project:myt:1.5.1:*:*:*:*:*:*:*
- (no CPE)range: = 1.5.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.exploit-db.com/exploits/46084nvdExploitVDB Entry
- www.vulncheck.com/advisories/myt-pm-sql-injection-via-charge-group-total-parameternvdThird Party Advisory
- manageyourteam.netnvdBroken Link
- sourceforge.net/projects/myt/nvdProduct
News mentions
0No linked articles in our index yet.