Web Ofisi Firma v13 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'oz' array parameter. Attackers can send GET requests to category pages with malicious 'oz[]' values using time-based blind SQL injection payloads to extract sensitive database information.
Web Ofisi Firma v13 SQL Injection via oz Parameter
Problem type
Affected products
Web-ofisi
v13 - AFFECTED
References
https://www.exploit-db.com/exploits/47145
https://www.web-ofisi.com/detay/kurumsal-firma-v13-sinirsiz-dil.html
https://www.vulncheck.com/advisories/web-ofisi-firma-sql-injection-via-oz-parameter
GitHub Security Advisories
GHSA-qx92-pw43-vf25
Web Ofisi Firma v13 contains an SQL injection vulnerability that allows unauthenticated attackers...
https://github.com/advisories/GHSA-qx92-pw43-vf25Web Ofisi Firma v13 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'oz' array parameter. Attackers can send GET requests to category pages with malicious 'oz[]' values using time-based blind SQL injection payloads to extract sensitive database information.
https://nvd.nist.gov/vuln/detail/CVE-2019-25457
https://www.exploit-db.com/exploits/47145
https://www.vulncheck.com/advisories/web-ofisi-firma-sql-injection-via-oz-parameter
https://www.web-ofisi.com/detay/kurumsal-firma-v13-sinirsiz-dil.html
https://github.com/advisories/GHSA-qx92-pw43-vf25
JSON source
https://cveawg.mitre.org/api/cve/CVE-2019-25457Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2019-25457",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2026-02-22T14:12:11.280Z",
"dateReserved": "2026-02-22T13:57:46.022Z",
"datePublished": "2026-02-22T14:12:11.280Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2026-02-22T14:12:11.280Z"
},
"title": "Web Ofisi Firma v13 SQL Injection via oz Parameter",
"descriptions": [
{
"lang": "en",
"value": "Web Ofisi Firma v13 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'oz' array parameter. Attackers can send GET requests to category pages with malicious 'oz[]' values using time-based blind SQL injection payloads to extract sensitive database information."
}
],
"affected": [
{
"vendor": "Web-ofisi",
"product": "Firma",
"versions": [
{
"version": "v13",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.exploit-db.com/exploits/47145",
"name": "ExploitDB-47145",
"tags": [
"exploit"
]
},
{
"url": "https://www.web-ofisi.com/detay/kurumsal-firma-v13-sinirsiz-dil.html",
"name": "Official Product Homepage",
"tags": [
"product"
]
},
{
"url": "https://www.vulncheck.com/advisories/web-ofisi-firma-sql-injection-via-oz-parameter",
"name": "VulnCheck Advisory: Web Ofisi Firma v13 SQL Injection via oz Parameter",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS"
},
{
"format": "CVSS",
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
}
}
],
"credits": [
{
"lang": "en",
"value": "Ahmet Ümit BAYRAM",
"type": "finder"
}
]
}
}
}