CVE-2018-25188
Published: 06 March 2026
Description
Webiness Inventory 2.3 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the order parameter. Attackers can send POST requests to the WsModelGrid.php endpoint with crafted SQL payloads to extract…
more
sensitive database information including usernames, databases, and version details.
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates validation of the unsanitized 'order' parameter in WsModelGrid.php to prevent SQL injection execution.
Requires timely identification, reporting, and correction of the SQL injection flaw in Webiness Inventory 2.3 to eliminate the vulnerability.
Enforces restrictions on information inputs at system boundaries to block malicious SQL payloads in POST requests to the vulnerable endpoint.
Security SummaryAI
CVE-2018-25188 is an SQL injection vulnerability (CWE-89) affecting Webiness Inventory version 2.3. The flaw resides in the WsModelGrid.php endpoint, where the order parameter fails to properly sanitize user input, allowing attackers to inject malicious SQL code. Published on 2026-03-06 with a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), it enables high-impact confidentiality breaches with low integrity impact and no availability disruption.
Unauthenticated remote attackers can exploit this vulnerability by sending POST requests to the WsModelGrid.php endpoint with crafted SQL payloads in the order parameter. Successful exploitation allows execution of arbitrary SQL queries, permitting extraction of sensitive database information such as usernames, database names, and version details.
Advisories and references include a proof-of-concept exploit published on Exploit-DB (https://www.exploit-db.com/exploits/45843) and a detailed advisory from Vulncheck (https://www.vulncheck.com/advisories/webiness-inventory-sql-injection-via-wsmodelgridphp), which document the issue but do not specify patches or mitigations in the provided information.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web application (T1190) enables arbitrary database queries for sensitive data extraction (T1213.006).