CVE-2018-25182
Published: 06 March 2026
Description
Silurus Classifieds Script 2.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the ID parameter. Attackers can send GET requests to wcategory.php with crafted SQL payloads in the ID…
more
parameter to extract database table names and sensitive information from the database.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation and sanitization of untrusted inputs like the ID parameter in wcategory.php.
Restricts the ID parameter to safe classes such as numeric values, blocking SQL injection payloads in GET requests.
Mandates timely remediation of the specific SQL injection flaw in Silurus Classifieds Script 2.0 via patching or code corrections.
Security SummaryAI
CVE-2018-25182 is an SQL injection vulnerability (CWE-89) in Silurus Classifieds Script 2.0, specifically affecting the wcategory.php component via the ID parameter. This flaw enables attackers to inject malicious SQL code, leading to arbitrary SQL query execution. The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N) and was published on 2026-03-06T13:16:00.640.
Unauthenticated remote attackers can exploit this vulnerability by sending crafted GET requests to wcategory.php with SQL payloads in the ID parameter. Successful exploitation allows extraction of database table names and sensitive information from the database, providing high confidentiality impact with low integrity impact and no availability impact.
Advisories and proof-of-concept exploits are documented in references including https://www.exploit-db.com/exploits/45838 and https://www.vulncheck.com/advisories/silurus-classifieds-script-sql-injection-via-wcategoryphp, which detail the injection vectors but do not specify patches or mitigations in the provided CVE information. Security practitioners should review these for remediation guidance.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web application enables exploitation of public-facing application (T1190) and arbitrary database queries for data collection from databases (T1213.006).