Cyber Posture

CVE-2019-25479

HighPublic PoC

Published: 12 March 2026

Published
12 March 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0012 30.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Inout RealEstate contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the city parameter. Attackers can send POST requests to the agents/agentlistdetails endpoint with malicious SQL payloads in the city parameter…

more

to extract sensitive database information.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection by requiring validation and sanitization of the unsanitized city parameter in POST requests to the agents/agentlistdetails endpoint.

prevent

Mandates identification, reporting, and correction of the specific SQL injection flaw in the Inout RealEstate software.

prevent

Enforces restrictions on the city parameter to only allow valid inputs, blocking malicious SQL payloads.

Security SummaryAI

CVE-2019-25479 is an SQL injection vulnerability (CWE-89) in the Inout RealEstate software. The flaw resides in the agents/agentlistdetails endpoint, where the city parameter in POST requests fails to properly sanitize input, allowing attackers to inject malicious SQL code and manipulate database queries. It carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low integrity impact and no availability impact.

Unauthenticated remote attackers can exploit this vulnerability by sending crafted POST requests to the agents/agentlistdetails endpoint with SQL payloads in the city parameter. Successful exploitation enables extraction of sensitive database information, such as user credentials or other confidential data stored in the backend database.

Advisories and exploit details are documented in references including the Vulncheck advisory at https://www.vulncheck.com/advisories/inout-realestate-lastest-sql-injection-via-agentlistdetails and an Exploit-DB entry at https://www.exploit-db.com/exploits/46631, which provide further technical analysis and proof-of-concept information for mitigation strategies.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing web endpoint (T1190) enables unauthenticated remote exploitation to extract sensitive data from databases (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References