Cyber Posture

CVE-2018-25199

HighPublic PoC

Published: 06 March 2026

Published
06 March 2026
Modified
11 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0023 45.3th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

OOP CMS BLOG 1.0 contains SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through multiple parameters. Attackers can inject SQL commands via the search parameter in search.php, pageid parameter in page.php, and…

more

id parameter in posts.php to extract database information including table names, schema names, and database credentials.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection by requiring validation and sanitization of user inputs like search, pageid, and id parameters before incorporation into SQL queries.

preventrecover

Mandates identification, reporting, and correction of coding flaws such as the SQL injection vulnerabilities in search.php, page.php, and posts.php.

detect

Enables vulnerability scanning to identify SQL injection flaws in web applications like OOP CMS BLOG, allowing remediation before exploitation.

Security SummaryAI

CVE-2018-25199 is a SQL injection vulnerability affecting OOP CMS BLOG version 1.0. The flaw exists in multiple parameters across PHP files, including the search parameter in search.php, pageid parameter in page.php, and id parameter in posts.php. These allow attackers to inject malicious SQL code, enabling execution of arbitrary SQL queries. The vulnerability is rated with a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N) and is associated with CWE-89.

Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no privileges required. By injecting SQL commands through the vulnerable parameters, attackers can extract sensitive database information, such as table names, schema names, and database credentials.

Advisories and a proof-of-concept exploit are documented in references including Exploit-DB (exploit 45799) and Vulncheck, which detail the SQL injection via the search parameter and other vectors. No specific patch or mitigation details are outlined in the provided CVE information.

Details

CWE(s)

Affected Products

tomalofficial
php oop cms blog
1.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing CMS enables unauthenticated remote exploitation of web application (T1190) to execute arbitrary SQL queries and collect data from databases (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References