CVE-2019-25391
Received Received - Intake
Time-Based Blind SQL Injection in Ashop Admin Endpoint

Publication date: 2026-02-22

Last updated on: 2026-02-22

Assigner: VulnCheck

Description
Ashop Shopping Cart Software contains a time-based blind SQL injection vulnerability that allows attackers to manipulate database queries through the blacklistitemid parameter. Attackers can send POST requests to the admin/bannedcustomers.php endpoint with crafted SQL payloads using SLEEP functions to extract sensitive database information.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-22
Last Modified
2026-02-22
Generated
2026-05-07
AI Q&A
2026-02-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ashop shopping_cart_software From 5.0.12 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "The vulnerability in Ashop Shopping Cart Software is a time-based blind SQL injection found in the 'blacklistitemid' POST parameter of the admin/bannedcustomers.php script. Attackers can send specially crafted SQL payloads that use the SLEEP() function to delay database responses, confirming the injection point and allowing them to manipulate database queries."}, {'type': 'paragraph', 'content': 'This means an attacker can exploit this flaw to extract sensitive information from the database by observing response delays caused by injected SQL commands.'}] [1]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': 'This vulnerability can allow unauthorized attackers to manipulate SQL queries within the affected application, potentially leading to exposure of sensitive database information.'}, {'type': 'paragraph', 'content': 'By exploiting the time-based blind SQL injection, attackers can extract confidential data, which may include customer information or other critical data stored in the database.'}, {'type': 'paragraph', 'content': "Such unauthorized data access can compromise the integrity and confidentiality of your system's data."}] [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability can be detected by sending crafted POST requests to the admin/bannedcustomers.php endpoint with the 'blacklistitemid' parameter containing time-based blind SQL injection payloads."}, {'type': 'paragraph', 'content': 'For example, you can test the injection point by sending a POST request with the parameter: blacklistitemid=1 AND (SELECT * FROM (SELECT(SLEEP(5)))MGvE). If the response is delayed by approximately 5 seconds, it confirms the presence of the vulnerability.'}, {'type': 'paragraph', 'content': 'A sample command using curl to test this would be:'}, {'type': 'list_item', 'content': 'curl -X POST -d "blacklistitemid=1 AND (SELECT * FROM (SELECT(SLEEP(5)))MGvE)" http://targetsite/admin/bannedcustomers.php'}] [1]


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart