Home

Description

Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting improper SQL query validation. Attackers can submit SQL injection payloads in the username and password fields of the admingiris.php login form to bypass authentication and access the administrative interface.

PUBLISHED Reserved 2026-03-12 | Published 2026-03-12 | Updated 2026-03-12 | Assigner VulnCheck




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

2.0
affected

Credits

Ahmet Ümit BAYRAM finder

References

www.exploit-db.com/exploits/46598 (ExploitDB-46598) exploit

www.vulncheck.com/...sitesi-scripti-v2-authentication-bypass (VulnCheck Advisory: Jettweb PHP Hazir Haber Sitesi Scripti V2 Authentication Bypass) third-party-advisory

cve.org (CVE-2019-25510)

nvd.nist.gov (CVE-2019-25510)

Download JSON