FreeSMS 2.1.2 contains a boolean-based blind SQL injection vulnerability in the password parameter that allows unauthenticated attackers to bypass authentication by injecting SQL code through the login endpoint. Attackers can exploit the vulnerable password parameter in requests to /pages/crc_handler.php?method=login to authenticate as any known user and subsequently modify their password via the profile update function.
History

Thu, 05 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Freesms
Freesms freesms
Vendors & Products Freesms
Freesms freesms

Wed, 04 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description FreeSMS 2.1.2 contains a boolean-based blind SQL injection vulnerability in the password parameter that allows unauthenticated attackers to bypass authentication by injecting SQL code through the login endpoint. Attackers can exploit the vulnerable password parameter in requests to /pages/crc_handler.php?method=login to authenticate as any known user and subsequently modify their password via the profile update function.
Title FreeSMS 2.1.2 Authentication Bypass via SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-03-04T17:15:52.261Z

Updated: 2026-03-05T15:57:45.759Z

Reserved: 2026-03-04T17:12:21.182Z

Link: CVE-2019-25506

cve-icon Vulnrichment

Updated: 2026-03-05T15:57:41.119Z

cve-icon NVD

Status : Received

Published: 2026-03-04T18:16:09.620

Modified: 2026-03-04T18:16:09.620

Link: CVE-2019-25506

cve-icon Redhat

No data.