PilusCart 1.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter. Attackers can submit POST requests to the comment submission endpoint with RLIKE-based boolean SQL injection payloads to extract sensitive database information.
Metrics
Affected Vendors & Products
References
History
Sun, 05 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PilusCart 1.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter. Attackers can submit POST requests to the comment submission endpoint with RLIKE-based boolean SQL injection payloads to extract sensitive database information. | |
| Title | PilusCart 1.4.1 SQL Injection via send Parameter | |
| First Time appeared |
Kartatopia
Kartatopia piluscart |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:kartatopia:piluscart:1.4.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Kartatopia
Kartatopia piluscart |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-04-05T20:45:25.098Z
Updated: 2026-04-05T20:45:25.098Z
Reserved: 2026-04-05T13:16:57.228Z
Link: CVE-2019-25672
No data.
Status : Received
Published: 2026-04-05T21:16:44.943
Modified: 2026-04-05T21:16:44.943
Link: CVE-2019-25672
No data.