CVE-2019-25486
Published: 11 March 2026
Description
Varient 1.6.1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the user_id parameter. Attackers can submit POST requests with crafted SQL payloads in the user_id field to bypass authentication and…
more
extract sensitive database information.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 mandates validation of information inputs such as the user_id parameter to block SQL injection payloads from manipulating database queries.
SI-2 requires timely identification, reporting, and correction of flaws like the SQL injection vulnerability in Varient 1.6.1.
RA-5 provides vulnerability scanning to detect SQL injection issues like CVE-2019-25486 in the user_id parameter for prioritized remediation.
Security SummaryAI
CVE-2019-25486 is an SQL injection vulnerability (CWE-89) affecting Varient version 1.6.1. The issue resides in the handling of the user_id parameter, which allows attackers to inject malicious SQL code into database queries via POST requests. Published on 2026-03-11, it carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high severity due to network accessibility, low attack complexity, and no privileges required.
Unauthenticated attackers can exploit this vulnerability remotely by crafting POST requests with SQL payloads in the user_id field. This enables manipulation of database queries, bypassing authentication mechanisms, and extracting sensitive information from the database, with high confidentiality impact and low integrity impact.
Advisories and related resources include a Vulncheck advisory detailing the SQL injection via the user_id parameter at https://www.vulncheck.com/advisories/varient-sql-injection-via-user-id-parameter, a proof-of-concept exploit on Exploit-DB at https://www.exploit-db.com/exploits/47058, and the Varient website at https://varient.codingest.com/.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web application enables initial access (T1190) and extraction of sensitive data from databases (T1213.006).