CVE-2019-25498
Simple Job Script SQL Injection via searched Endpoint
CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
0th
Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the landing_location parameter. Attackers can send POST requests to the searched endpoint with malicious SQL payloads to bypass authentication and extract sensitive database information.
| CWE | CWE-89 |
| Vendor | niteosoft |
| Product | simple job script |
| Published | Mar 4, 2026 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for niteosoft simple job script
Be the first to know when new high vulnerabilities affecting niteosoft simple job script are published β delivered to Slack, Telegram or Discord.
Get Free Alerts β
Free Β· No credit card Β· 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None
Affected Versions
niteosoft / Simple Job Script
1.66
References
Credits
Ahmet Γmit BAYRAM