CVE-2019-25479
Published: 12 March 2026
Description
Inout RealEstate contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the city parameter. Attackers can send POST requests to the agents/agentlistdetails endpoint with malicious SQL payloads in the city parameter…
more
to extract sensitive database information.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation and sanitization of the unsanitized city parameter in POST requests to the agents/agentlistdetails endpoint.
Mandates identification, reporting, and correction of the specific SQL injection flaw in the Inout RealEstate software.
Enforces restrictions on the city parameter to only allow valid inputs, blocking malicious SQL payloads.
Security SummaryAI
CVE-2019-25479 is an SQL injection vulnerability (CWE-89) in the Inout RealEstate software. The flaw resides in the agents/agentlistdetails endpoint, where the city parameter in POST requests fails to properly sanitize input, allowing attackers to inject malicious SQL code and manipulate database queries. It carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low integrity impact and no availability impact.
Unauthenticated remote attackers can exploit this vulnerability by sending crafted POST requests to the agents/agentlistdetails endpoint with SQL payloads in the city parameter. Successful exploitation enables extraction of sensitive database information, such as user credentials or other confidential data stored in the backend database.
Advisories and exploit details are documented in references including the Vulncheck advisory at https://www.vulncheck.com/advisories/inout-realestate-lastest-sql-injection-via-agentlistdetails and an Exploit-DB entry at https://www.exploit-db.com/exploits/46631, which provide further technical analysis and proof-of-concept information for mitigation strategies.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web endpoint (T1190) enables unauthenticated remote exploitation to extract sensitive data from databases (T1213.006).