Cyber Posture

CVE-2018-25196

HighPublic PoC

Published: 06 March 2026

Published
06 March 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0031 53.7th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

ServerZilla 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the email parameter. Attackers can send POST requests to reset.php with malicious email values containing SQL operators to bypass authentication…

more

and extract sensitive database information.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents SQL injection by requiring validation and sanitization of user inputs like the email parameter before incorporation into database queries.

prevent

SI-2 requires timely identification, reporting, and correction of flaws such as the unsanitized email parameter in reset.php, remediating the root cause of this CVE.

prevent

SI-9 enforces restrictions on inputs like the email parameter, such as format and length limits, to block malicious SQL payloads.

Security SummaryAI

CVE-2018-25196 is an SQL injection vulnerability (CWE-89) affecting ServerZilla 1.0. The flaw resides in the reset.php component, where the email parameter fails to properly sanitize user input, allowing attackers to inject SQL code into database queries.

Unauthenticated remote attackers can exploit this vulnerability by sending POST requests to reset.php with malicious values in the email parameter, such as SQL operators. Successful exploitation enables bypassing authentication mechanisms and extracting sensitive information from the database. The issue carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), reflecting high confidentiality impact with low complexity and no required privileges.

Advisories and related resources, including the Vulncheck advisory at https://www.vulncheck.com/advisories/serverzilla-sql-injection-via-email-parameter and a proof-of-concept exploit at https://www.exploit-db.com/exploits/45817, provide further details on the vulnerability. The CVE was published on 2026-03-06.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing web application (reset.php) enables exploitation of public-facing application (T1190) and direct extraction of sensitive data from databases (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References