Home

Description

DIGIT CENTRIS ERP contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the datum1, datum2, KID, and PID parameters. Attackers can send POST requests to /korisnikinfo.php with malicious SQL syntax in these parameters to extract or modify sensitive database information.

PUBLISHED Reserved 2026-02-20 | Published 2026-02-22 | Updated 2026-02-22 | Assigner VulnCheck




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

*
affected

Credits

n1x_ [MS-WEB] finder

References

www.exploit-db.com/exploits/47401 (ExploitDB-47401) exploit

www.vulncheck.com/...rsion-sql-injection-via-datum-parameter (VulnCheck Advisory: DIGIT CENTRIS ERP Every version SQL Injection via datum1 Parameter) third-party-advisory

cve.org (CVE-2019-25446)

nvd.nist.gov (CVE-2019-25446)

Download JSON