ResourceSpace 8.6 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'ref' parameter. Attackers can send GET requests to the watched_searches.php endpoint with crafted SQL payloads to extract sensitive database information including usernames and credentials.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 05 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ResourceSpace 8.6 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'ref' parameter. Attackers can send GET requests to the watched_searches.php endpoint with crafted SQL payloads to extract sensitive database information including usernames and credentials. | |
| Title | ResourceSpace 8.6 SQL Injection via watched_searches.php | |
| First Time appeared |
Montala
Montala resourcespace |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:montala:resourcespace:8.6:*:*:*:*:*:*:* | |
| Vendors & Products |
Montala
Montala resourcespace |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-05T20:45:16.812Z
Reserved: 2026-04-05T12:59:40.774Z
Link: CVE-2019-25662
No data.
Status : Received
Published: 2026-04-05T21:16:43.223
Modified: 2026-04-05T21:16:43.223
Link: CVE-2019-25662
No data.
OpenCVE Enrichment
No data.
Weaknesses