CVE-2019-25325
Severity CVSS v4.0:
HIGH
Type:
CWE-89
SQL Injection
Publication date:
12/02/2026
Last modified:
13/02/2026
Description
Thrive Smart Home 1.1 contains an SQL injection vulnerability in the checklogin.php endpoint that allows unauthenticated attackers to bypass authentication by manipulating the 'user' POST parameter. Attackers can inject malicious SQL code like ' or 1=1# to manipulate login queries and gain unauthorized access to the application.
Impact
Base Score 4.0
8.80
Severity 4.0
HIGH
Base Score 3.x
8.20
Severity 3.x
HIGH
References to Advisories, Solutions, and Tools
- https://cxsecurity.com/issue/WLB-2020010019
- https://exchange.xforce.ibmcloud.com/vulnerabilities/173728
- https://packetstorm.news/files/id/155797
- https://www.exploit-db.com/exploits/47814
- https://www.vulncheck.com/advisories/thrive-smart-home-smart-home-improper-limitation-o
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5554.php



