microASP Portal+ CMS contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the explode_tree parameter. Attackers can send crafted requests to pagina.phtml with SQL injection payloads using extractvalue and concat functions to extract sensitive database information like the current database name.
Metrics
Affected Vendors & Products
References
History
Mon, 23 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microasp
Microasp microasp (portal+) Cms |
|
| Vendors & Products |
Microasp
Microasp microasp (portal+) Cms |
Sun, 22 Feb 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | microASP Portal+ CMS contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the explode_tree parameter. Attackers can send crafted requests to pagina.phtml with SQL injection payloads using extractvalue and concat functions to extract sensitive database information like the current database name. | |
| Title | microASP Portal+ CMS SQL Injection via pagina.phtml | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-02-22T13:43:49.812Z
Updated: 2026-02-22T13:43:49.812Z
Reserved: 2026-02-15T12:45:19.065Z
Link: CVE-2019-25366
No data.
Status : Awaiting Analysis
Published: 2026-02-22T14:15:59.433
Modified: 2026-02-23T18:13:53.397
Link: CVE-2019-25366
No data.