Home

Description

Kados R10 GreenBee contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the user2reset parameter. Attackers can send crafted requests with malicious SQL payloads to extract sensitive database information or modify data.

PUBLISHED Reserved 2026-04-05 | Published 2026-04-05 | Updated 2026-04-06 | Assigner VulnCheck




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

R10 GreenBee
affected

Credits

Mehmet EMIROGLU finder

References

www.exploit-db.com/exploits/46505 (ExploitDB-46505) exploit

www.kados.info/ (Official Product Homepage) product

sourceforge.net/projects/kados/ (Product Reference) product

www.vulncheck.com/...0-greenbee-sql-injection-via-user2reset (VulnCheck Advisory: Kados R10 GreenBee SQL Injection via user2reset) third-party-advisory

cve.org (CVE-2019-25694)

nvd.nist.gov (CVE-2019-25694)

Download JSON