Cyber Posture

CVE-2018-25203

HighPublic PoC

Published: 26 March 2026

Published
26 March 2026
Modified
01 May 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0012 31.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Online Store System CMS 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the email parameter. Attackers can send POST requests to index.php with the action=clientaccess parameter using boolean-based blind…

more

or time-based blind SQL injection payloads in the email field to extract sensitive database information.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of the email parameter in POST requests to prevent SQL injection payloads from manipulating database queries.

prevent

Directly addresses remediation of the SQL injection flaw in the index.php clientaccess action by identifying, reporting, and correcting the vulnerability.

detect

Vulnerability scanning detects SQL injection vulnerabilities like CVE-2018-25203 in web applications such as the Online Store System CMS.

Security SummaryAI

CVE-2018-25203 is an SQL injection vulnerability (CWE-89) in Online Store System CMS 1.0. The flaw resides in the email parameter processed via POST requests to index.php with the action=clientaccess parameter, enabling attackers to inject SQL code and manipulate database queries. It carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low integrity impact and no availability impact.

Unauthenticated remote attackers can exploit this vulnerability by crafting POST requests containing boolean-based blind or time-based blind SQL injection payloads in the email field. Successful exploitation allows extraction of sensitive database information without requiring privileges, user interaction, or elevated scope.

Advisories detail the issue, including exploit proofs and vulnerability descriptions, available at https://www.exploit-db.com/exploits/44719, https://www.vulncheck.com/advisories/online-store-system-cms-sql-injection-via-clientaccess, and https://www.wecodex.com/item/view/online-store-system-in-php-and-mysql/3. No vendor patches are specified in the CVE details.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

CVE describes unauthenticated remote SQL injection in a public-facing web application (T1190), enabling extraction of sensitive data from databases (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References