Cyber Posture

CVE-2018-25172

HighPublic PoC

Published: 06 March 2026

Published
06 March 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0012 30.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Pedidos 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'q' parameter. Attackers can send GET requests to the ajax/load_proveedores.php endpoint with crafted SQL payloads to extract sensitive…

more

database information including schema names and table structures.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of the 'q' parameter input to the ajax/load_proveedores.php endpoint to block malicious SQL injection payloads.

prevent

Mandates identification, reporting, and correction of the SQL injection flaw in the application code to eliminate the vulnerability.

detect

Enables monitoring of system activities to identify SQL injection attacks through anomalous database queries or access patterns.

Security SummaryAI

CVE-2018-25172 is an SQL injection vulnerability (CWE-89) in Pedidos 1.0. The flaw resides in the ajax/load_proveedores.php endpoint, where the 'q' parameter fails to properly sanitize input, enabling attackers to inject and execute arbitrary SQL queries.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity by sending crafted GET requests to the vulnerable endpoint. Successful exploitation allows extraction of sensitive database information, including schema names and table structures, resulting in high confidentiality impact, low integrity impact, and no availability impact, as reflected in the CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N).

Advisories and proof-of-concept exploits are available at https://www.exploit-db.com/exploits/45856 and https://www.vulncheck.com/advisories/pedidos-sql-injection-via-load-proveedoresphp, which detail the vulnerability and exploitation methods.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection vulnerability in public-facing web endpoint directly enables T1190 (Exploit Public-Facing Application) and facilitates arbitrary database queries for data extraction (T1213.006: Databases).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References