Cyber Posture

CVE-2018-25166

HighPublic PoC

Published: 06 March 2026

Published
06 March 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0012 30.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Meneame English Pligg 5.8 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the search parameter. Attackers can send GET requests to index.php with crafted SQL payloads in the search…

more

parameter to extract sensitive database information including usernames, database names, and version details.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of the search parameter input to block malicious SQL payloads before they reach the database query.

prevent

Mandates identification, reporting, and correction of the specific SQL injection flaw in Meneame English Pligg 5.8.

detect

Vulnerability scanning detects the SQL injection vulnerability in the index.php search parameter for remediation.

Security SummaryAI

CVE-2018-25166 is an SQL injection vulnerability (CWE-89) affecting Meneame English Pligg version 5.8. The issue occurs in the search parameter of the index.php script, where user input is not properly sanitized, enabling the injection of malicious SQL code. Published on 2026-03-06, it carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), highlighting high confidentiality impact with low attack complexity.

Unauthenticated attackers can exploit this vulnerability remotely by sending GET requests to index.php with crafted SQL payloads in the search parameter. Successful exploitation allows execution of arbitrary SQL queries, enabling extraction of sensitive database information such as usernames, database names, and version details.

Advisories and related resources, including those at https://www.vulncheck.com/advisories/meneame-english-pligg-sql-injection-via-search-parameter and https://www.exploit-db.com/exploits/45875, provide further details on the vulnerability, including a proof-of-concept exploit. Security practitioners should consult these for guidance on mitigation, such as upgrading affected software or implementing input validation.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing web application (T1190) enables arbitrary query execution for database data extraction (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References