Cyber Posture

CVE-2018-25182

HighPublic PoC

Published: 06 March 2026

Published
06 March 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0012 30.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Silurus Classifieds Script 2.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the ID parameter. Attackers can send GET requests to wcategory.php with crafted SQL payloads in the ID…

more

parameter to extract database table names and sensitive information from the database.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection by requiring validation and sanitization of untrusted inputs like the ID parameter in wcategory.php.

prevent

Restricts the ID parameter to safe classes such as numeric values, blocking SQL injection payloads in GET requests.

prevent

Mandates timely remediation of the specific SQL injection flaw in Silurus Classifieds Script 2.0 via patching or code corrections.

Security SummaryAI

CVE-2018-25182 is an SQL injection vulnerability (CWE-89) in Silurus Classifieds Script 2.0, specifically affecting the wcategory.php component via the ID parameter. This flaw enables attackers to inject malicious SQL code, leading to arbitrary SQL query execution. The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N) and was published on 2026-03-06T13:16:00.640.

Unauthenticated remote attackers can exploit this vulnerability by sending crafted GET requests to wcategory.php with SQL payloads in the ID parameter. Successful exploitation allows extraction of database table names and sensitive information from the database, providing high confidentiality impact with low integrity impact and no availability impact.

Advisories and proof-of-concept exploits are documented in references including https://www.exploit-db.com/exploits/45838 and https://www.vulncheck.com/advisories/silurus-classifieds-script-sql-injection-via-wcategoryphp, which detail the injection vectors but do not specify patches or mitigations in the provided CVE information. Security practitioners should review these for remediation guidance.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing web application enables exploitation of public-facing application (T1190) and arbitrary database queries for data collection from databases (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References