CVE-2019-25456
Published: 22 February 2026
Description
Web Ofisi Emlak v2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'ara' GET parameter. Attackers can send requests to with time-based SQL injection payloads to extract sensitive database…
more
information or cause denial of service.
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates validation and sanitization of user inputs like the 'ara' GET parameter to block SQL injection payloads.
Requires timely remediation of software flaws, such as the lack of input sanitization causing this SQL injection vulnerability.
Enables real-time monitoring to identify anomalous database queries or time-based SQL injection attempts.
Security SummaryAI
CVE-2019-25456 is an SQL injection vulnerability (CWE-89) in Web Ofisi Emlak v2, where the 'ara' GET parameter fails to properly sanitize user input, allowing attackers to inject and manipulate database queries. This flaw affects the real estate script software, enabling arbitrary SQL code execution. The vulnerability carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H) and was published on 2026-02-22T15:16:15.187.
Unauthenticated attackers with network access can exploit this vulnerability remotely and with low complexity, without requiring user interaction. By sending crafted requests with time-based SQL injection payloads through the 'ara' parameter, they can extract sensitive database information or trigger denial of service conditions.
References include a proof-of-concept exploit on Exploit-DB (https://www.exploit-db.com/exploits/47141), a Vulncheck advisory detailing the SQL injection via the 'ara' parameter (https://www.vulncheck.com/advisories/web-ofisi-emlak-sql-injection-via-ara-parameter), and the vendor product page for Emlak Scripti v2 (https://www.web-ofisi.com/detay/emlak-scripti-v2.html).
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web app directly enables exploitation (T1190), arbitrary database queries for data extraction (T1213.006), and DoS conditions (T1499.004).