JustAppSec
Back to news

SQL injection bypasses eDirectory admin auth, exposes PHP files

2 min readPublished 05 Apr 2026Updated 05 Apr 2026Source: CVEProject (cvelistV5)

TL;DR — A union-based SQL injection in eDirectory’s login flow can bypass admin authentication and then be chained into arbitrary PHP file reads via language_file.php, with a public Exploit-DB reference.

What happened

eDirectory is an “online directory software” platform used to build and run listing-style websites (business listings, classifieds, events, etc.).

CVE-2019-25675 describes multiple SQL injection vulnerabilities that allow an unauthenticated attacker to bypass administrator authentication by injecting SQL into parameters. The CVE states attackers can exploit the key parameter in the login endpoint with union-based SQL injection to authenticate as an administrator, and then leverage an authenticated file disclosure path in language_file.php to read arbitrary PHP files from the server.

Operationally, this is a high-risk webapp pattern: unauthenticated SQLi that yields admin access frequently collapses the rest of the application’s trust boundaries, and the CVE’s reference to a public Exploit-DB entry increases the likelihood of opportunistic scanning and exploitation once defenders’ vulnerability feeds pick it up.

Who is impacted

  • Self-hosted deployments of eDirectory that expose the login endpoint to untrusted networks.
  • Version scope is ambiguous across the same publication set (title vs affected list vs advisory summary).
ItemSource value
CVE titleeDirectory All Versions SQL Injection Authentication Bypass
CVE affected versions list1.0 (status: affected)
VulnCheck advisory “Affecting”eDirectory <= 1.0
Attack preconditionUnauthenticated (PR:N, UI:N)
SeverityCVSS v4.0 8.8 (High); CVSS v3.1 8.2 (High)
Public exploit referenceExploitDB-46423
Public disclosure date (per CVE)2019-02-19
CVE publish date2026-04-05

What to do now

  • Follow vendor remediation guidance for your deployed eDirectory version (the CVE record does not list a fixed version).
  • Inventory where eDirectory is deployed (web roots, containers, SBOM/SCA results) and determine whether your instance matches the affected scope noted above (treat “all versions” vs 1.0/<= 1.0 as a triage flag, not a safe assumption).
  • Reduce exposure while you validate patch status and reachability:
    • Restrict access to the admin/login surface (network ACLs, VPN-only access, authenticated gateway) where feasible.
    • Add monitoring for anomalous login requests and SQLi-like payloads against the login endpoint, especially involving a key parameter.
  • If compromise is suspected, treat this as an app compromise likely to include credential/session exposure:
    • Preserve webserver/app logs and review for suspicious admin sessions and requests to language_file.php.
    • Rotate credentials and secrets reachable by the eDirectory runtime (database passwords, SMTP creds, API keys).

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.