Cyber Posture

CVE-2018-25167

HighPublic PoC

Published: 06 March 2026

Published
06 March 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0012 30.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Net-Billetterie 2.9 contains an SQL injection vulnerability in the login parameter of login.inc.php that allows unauthenticated attackers to execute arbitrary SQL queries. Attackers can submit malicious SQL code through the login POST parameter to extract database information including usernames, passwords,…

more

and system credentials.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the insufficient input validation in the login POST parameter, preventing arbitrary SQL query execution via crafted payloads.

prevent

Ensures timely remediation of the specific SQL injection flaw in login.inc.php, eliminating the vulnerability at its source.

prevent

Restricts the login parameter inputs to prevent injection of malicious SQL code that extracts usernames, passwords, and credentials.

Security SummaryAI

CVE-2018-25167 is an SQL injection vulnerability (CWE-89) in Net-Billetterie version 2.9, specifically within the login parameter of the login.inc.php file. Published on 2026-03-06, it carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low integrity impact and no availability impact. The vulnerability enables execution of arbitrary SQL queries due to insufficient input validation on the login POST parameter.

Unauthenticated remote attackers can exploit this vulnerability by submitting crafted SQL payloads via the login parameter during authentication attempts. Exploitation allows attackers to extract sensitive database contents, such as usernames, passwords, and system credentials, potentially compromising the application's data integrity and user accounts.

Advisories referenced at https://www.exploit-db.com/exploits/45863 and https://www.vulncheck.com/advisories/net-billetterie-sql-injection-via-loginincphp detail the vulnerability, including proof-of-concept exploit code.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection vulnerability in public-facing web login enables unauthenticated exploitation of public-facing application (T1190) and arbitrary query extraction of sensitive database contents including credentials (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References