Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

675+ Articles
119+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2019-25693: ResourceSpace 8.6 SQL Injection via collection_edit.php Keywords Parameter
CVE-2019-25693: ResourceSpace 8.6 SQL Injection via collection_edit.php Keywords Parameter
SECURITYHIGHCVE-2019-25693

CVE-2019-25693: ResourceSpace 8.6 SQL Injection via collection_edit.php Keywords Parameter

ResourceSpace 8.6 contains an authenticated SQL injection vulnerability in collection_edit.php that allows attackers to execute arbitrary SQL queries by injecting payloads through the keywords parameter, enabling extraction of sensitive database contents.

Dylan H.

Security Team

April 13, 2026
4 min read

Affected Products

  • ResourceSpace 8.6

Overview

CVE-2019-25693 is a high severity SQL injection vulnerability (CVSS 7.1) affecting ResourceSpace version 8.6, an open-source Digital Asset Management (DAM) system. The vulnerability exists in the collection_edit.php script and allows authenticated users to inject arbitrary SQL code through the keywords POST parameter, potentially exposing all data stored in the backend database.

This vulnerability was published to the National Vulnerability Database (NVD) on April 12, 2026.


Technical Details

Vulnerability Type

  • CWE Classification: CWE-89 — Improper Neutralization of Special Elements used in an SQL Command (SQL Injection)
  • CVSS Score: 7.1 (High)
  • Attack Vector: Network
  • Authentication Required: Yes (authenticated attacker)
  • Attack Complexity: Low

Affected Endpoint

/pages/collection_edit.php

The keywords parameter in a POST request to this endpoint is passed directly into a SQL query without proper sanitization or parameterization, allowing an attacker to inject SQL code.

Proof of Concept

An authenticated attacker can submit a crafted POST request:

POST /pages/collection_edit.php HTTP/1.1
Host: target-resourcespace.example.com
Content-Type: application/x-www-form-urlencoded
Cookie: [valid session]
 
keywords=' UNION SELECT username,password,NULL FROM user--&...

By injecting a SQL UNION SELECT payload into the keywords field, the attacker can extract any table in the database, including:

  • User credentials (usernames, password hashes)
  • File metadata for all managed assets
  • Collection data and sharing permissions
  • API keys and tokens if stored in the database

Attack Flow

  1. Attacker authenticates to ResourceSpace with any valid account (including low-privilege users)
  2. Attacker navigates to a collection and triggers the collection_edit.php endpoint
  3. A crafted keywords value containing SQL injection payloads is submitted via POST
  4. The unsanitized input is concatenated into a live SQL query
  5. Database contents are returned within the application response

Impact Assessment

Impact AreaDescriptionSeverity
Data ConfidentialityFull database read accessHigh
Privilege EscalationExtract admin credentials for full takeoverHigh
Data IntegrityPotential for destructive SQL (DROP, UPDATE)Medium
AvailabilityDatabase manipulation could corrupt asset libraryMedium

ResourceSpace is commonly used by media organizations, universities, corporations, and government agencies to manage large libraries of digital assets. A successful SQL injection attack against such a deployment could expose:

  • Confidential media files and their metadata
  • Internal user directories with hashed passwords
  • Business-sensitive asset collections
  • Authentication tokens for external integrations

Affected Versions

ProductAffected VersionFix Status
ResourceSpace8.6Upgrade strongly recommended

Users of ResourceSpace should verify their currently running version and apply updates. The ResourceSpace project actively releases security patches — check the official repository for the latest stable release.


Remediation

Upgrade

Update ResourceSpace to the latest available version. Versions released after the vulnerability disclosure should include a patch for this specific injection point.

If Immediate Upgrade Is Not Possible

  1. Restrict access to collection_edit.php to trusted IP ranges using web server configuration.

  2. Deploy a Web Application Firewall (WAF) with SQL injection rules enabled. ModSecurity with the OWASP Core Rule Set (CRS) will block common SQL injection patterns.

  3. Implement prepared statements if maintaining a custom fork. Replace the vulnerable query with parameterized SQL:

    // Vulnerable (DO NOT USE)
    $sql = "SELECT * FROM collection WHERE keywords LIKE '%" . $keywords . "%'";
     
    // Fixed — use prepared statement
    $stmt = $db->prepare("SELECT * FROM collection WHERE keywords LIKE ?");
    $stmt->bind_param("s", "%{$keywords}%");
    $stmt->execute();
  4. Audit database user permissions. The ResourceSpace database account should not have privileges beyond SELECT, INSERT, UPDATE, and DELETE on required tables. Revoke DROP, CREATE, and GRANT privileges.

  5. Rotate all user passwords in any deployment that may have been exploited. If admin credentials were exposed, assume full system compromise.


Detection

Review web server access logs and application logs for:

  • POST requests to collection_edit.php containing SQL metacharacters (', --, UNION, SELECT, 1=1)
  • Unusually large response payloads from collection edit operations
  • Database error messages in application responses (sign of error-based injection attempts)

References

  • NVD Entry — CVE-2019-25693
  • CVSS v3.1 Score: 7.1 High
  • Published: April 12, 2026
  • ResourceSpace Official Site

Disclosure Timeline

DateEvent
2019 (original discovery)Vulnerability identified in ResourceSpace 8.6
April 12, 2026Published to National Vulnerability Database (NVD)

This advisory is provided for defensive and informational purposes. Organizations running ResourceSpace should treat this as a high-priority patch item given the authenticated SQL injection vector.

#Vulnerability#CVE#NVD#SQL Injection#ResourceSpace#DAM

Related Articles

CVE-2026-5637: SQL Injection in projectworlds Car Rental System 1.0

A remotely exploitable SQL injection vulnerability (CVE-2026-5637) has been disclosed in projectworlds Car Rental System 1.0. The flaw exists in...

4 min read

CVE-2019-25662: ResourceSpace 8.6 Unauthenticated SQL Injection

An unauthenticated SQL injection vulnerability in ResourceSpace 8.6 allows attackers to execute arbitrary database queries via the 'ref' parameter in...

4 min read

CVE-2019-25709: CF Image Hosting Script 1.6.5 Database Exposure and Unauthorized Deletion

A critical unauthenticated vulnerability in CF Image Hosting Script 1.6.5 allows attackers to download the application database, extract plaintext delete IDs, and delete all hosted images without authentication.

4 min read
Back to all Security Alerts