ResourceSpace 8.6 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the keywords parameter in collection_edit.php. Attackers can submit POST requests with crafted SQL payloads in the keywords field to extract sensitive database information including schema names, user credentials, and other confidential data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Resourcespace
Resourcespace resourcespace |
|
| Vendors & Products |
Resourcespace
Resourcespace resourcespace |
Sun, 12 Apr 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ResourceSpace 8.6 contains an SQL injection vulnerability that allows authenticated attackers to execute arbitrary SQL queries by injecting malicious code through the keywords parameter in collection_edit.php. Attackers can submit POST requests with crafted SQL payloads in the keywords field to extract sensitive database information including schema names, user credentials, and other confidential data. | |
| Title | ResourceSpace 8.6 SQL Injection via collection_edit.php | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-12T12:28:46.757Z
Reserved: 2026-04-05T15:33:50.051Z
Link: CVE-2019-25693
No data.
Status : Received
Published: 2026-04-12T13:16:32.270
Modified: 2026-04-12T13:16:32.270
Link: CVE-2019-25693
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:55:59Z
Weaknesses