Web Ofisi Platinum E-Ticaret v5 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'q' parameter. Attackers can send POST requests to the ajax/productsFilterSearch endpoint with malicious 'q' values using time-based blind SQL injection techniques to extract sensitive database information.
Web Ofisi Platinum E-Ticaret v5 SQL Injection via ajax/productsFilterSearch
Problem type
Affected products
Web-ofisi
v5 - AFFECTED
References
https://www.exploit-db.com/exploits/47140
https://www.web-ofisi.com/detay/platinum-e-ticaret-v5.html
https://www.vulncheck.com/advisories/web-ofisi-platinum-e-ticaret-sql-injection-via-ajaxproductsfiltersearch
GitHub Security Advisories
GHSA-982r-pxpw-xv2x
Web Ofisi Platinum E-Ticaret v5 contains an SQL injection vulnerability that allows...
https://github.com/advisories/GHSA-982r-pxpw-xv2xWeb Ofisi Platinum E-Ticaret v5 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'q' parameter. Attackers can send POST requests to the ajax/productsFilterSearch endpoint with malicious 'q' values using time-based blind SQL injection techniques to extract sensitive database information.
https://nvd.nist.gov/vuln/detail/CVE-2019-25461
https://www.exploit-db.com/exploits/47140
https://www.vulncheck.com/advisories/web-ofisi-platinum-e-ticaret-sql-injection-via-ajaxproductsfiltersearch
https://www.web-ofisi.com/detay/platinum-e-ticaret-v5.html
https://github.com/advisories/GHSA-982r-pxpw-xv2x
JSON source
https://cveawg.mitre.org/api/cve/CVE-2019-25461Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2019-25461",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2026-02-22T14:12:15.148Z",
"dateReserved": "2026-02-22T14:02:58.144Z",
"datePublished": "2026-02-22T14:12:15.148Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2026-02-22T14:12:15.148Z"
},
"title": "Web Ofisi Platinum E-Ticaret v5 SQL Injection via ajax/productsFilterSearch",
"descriptions": [
{
"lang": "en",
"value": "Web Ofisi Platinum E-Ticaret v5 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'q' parameter. Attackers can send POST requests to the ajax/productsFilterSearch endpoint with malicious 'q' values using time-based blind SQL injection techniques to extract sensitive database information."
}
],
"affected": [
{
"vendor": "Web-ofisi",
"product": "Ticaret",
"versions": [
{
"version": "v5",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.exploit-db.com/exploits/47140",
"name": "ExploitDB-47140",
"tags": [
"exploit"
]
},
{
"url": "https://www.web-ofisi.com/detay/platinum-e-ticaret-v5.html",
"name": "Official Product Homepage",
"tags": [
"product"
]
},
{
"url": "https://www.vulncheck.com/advisories/web-ofisi-platinum-e-ticaret-sql-injection-via-ajaxproductsfiltersearch",
"name": "VulnCheck Advisory: Web Ofisi Platinum E-Ticaret v5 SQL Injection via ajax/productsFilterSearch",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS"
},
{
"format": "CVSS",
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
}
}
],
"credits": [
{
"lang": "en",
"value": "Ahmet Ümit BAYRAM",
"type": "finder"
}
]
}
}
}