Home

Description

LabCollector 5.423 contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL commands by injecting malicious code through POST parameters. Attackers can submit crafted SQL payloads in the login parameter of login.php or the user_name parameter of retrieve_password.php to extract sensitive database information without authentication.

PUBLISHED Reserved 2026-02-20 | Published 2026-02-20 | Updated 2026-02-24 | Assigner VulnCheck




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

5.423
affected

Credits

Carlos Avila finder

References

www.exploit-db.com/exploits/47460 (ExploitDB-47460) exploit

labcollector.com/ (LabCollector Homepage) product

www.vulncheck.com/...labcollector-sql-injection-via-loginphp (VulnCheck Advisory: LabCollector 5.423 SQL Injection via login.php) third-party-advisory

cve.org (CVE-2019-25438)

nvd.nist.gov (CVE-2019-25438)

Download JSON