Cyber Posture

CVE-2018-25163

HighPublic PoC

Published: 06 March 2026

Published
06 March 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0012 30.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

BitZoom 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the rollno and username parameters in forgot.php and login.php. Attackers can submit crafted POST requests with SQL UNION statements…

more

to extract database schema information and table contents from the application database.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents SQL injection by requiring validation and sanitization of user inputs such as the rollno and username parameters in forgot.php and login.php.

prevent

SI-9 enforces restrictions on information inputs at web application boundaries to block oversized or malformed SQL injection payloads.

prevent

SI-2 mitigates the CVE by identifying, reporting, and correcting the specific SQL injection flaw in the affected PHP components.

Security SummaryAI

CVE-2018-25163 is an SQL injection vulnerability (CWE-89) affecting BitZoom 1.0. The flaw exists in the forgot.php and login.php components, where the rollno and username parameters fail to properly sanitize user input, allowing injection of malicious SQL code. Published on 2026-03-06, it carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), reflecting high severity due to its potential for remote exploitation.

Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By submitting crafted POST requests containing SQL UNION statements through the vulnerable parameters, they can execute arbitrary SQL queries to extract database schema information and contents from the application's database, enabling data exfiltration.

Advisories reference an Exploit-DB proof-of-concept at https://www.exploit-db.com/exploits/45862 and a Vulncheck advisory at https://www.vulncheck.com/advisories/bitzoom-sql-injection-via-rollno-parameter, which details the injection via the rollno parameter but provides no specific patch or mitigation guidance in the available CVE information.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing web application (login/forgot pages) enables exploitation of public-facing apps (T1190) and arbitrary database queries for data collection from databases (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References