Cyber Posture

CVE-2019-25488

HighPublic PoC

Published: 12 March 2026

Published
12 March 2026
Modified
17 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0012 30.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Jettweb Hazir Rent A Car Scripti V4 contains multiple SQL injection vulnerabilities in the admin panel that allow unauthenticated attackers to manipulate database queries through GET parameters. Attackers can inject SQL code into the 'tur', 'id', and 'ozellikdil' parameters of…

more

the admin/index.php endpoint to extract sensitive database information or cause denial of service.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of untrusted GET parameters like 'tur', 'id', and 'ozellikdil' to block SQL injection payloads before they reach the database.

prevent

Mandates identification, reporting, and correction of the specific SQL injection flaws in the admin/index.php endpoint to eliminate the vulnerability.

prevent

Boundary protection at web interfaces enables inspection and filtering of HTTP GET requests to block SQL injection attempts targeting the admin panel.

Security SummaryAI

CVE-2019-25488 affects Jettweb Hazir Rent A Car Scripti V4, a web application script, where multiple SQL injection vulnerabilities (CWE-89) exist in the admin panel. These flaws are present in the admin/index.php endpoint, allowing manipulation of database queries through unsanitized GET parameters including 'tur', 'id', and 'ozellikdil'. The vulnerability enables attackers to inject arbitrary SQL code, with a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact, low integrity impact, and no availability impact.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges or user interaction required. By sending crafted HTTP GET requests to the vulnerable endpoint, they can extract sensitive database information, such as user credentials or other confidential data, or potentially cause denial of service through malicious queries.

Advisories and exploit details are documented in references including https://www.exploit-db.com/exploits/46614, which provides a proof-of-concept exploit, and https://www.vulncheck.com/advisories/jettweb-hazir-rent-a-car-scripti-v4-sql-injection-via-admin, detailing the SQL injection via the admin panel. No specific patches or mitigation steps are outlined in the provided information.

Details

CWE(s)

Affected Products

jettweb
php ready rent a car site script
4

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in unauthenticated public-facing web application admin panel directly enables T1190 (Exploit Public-Facing Application) for remote exploitation and facilitates T1213.006 (Data from Databases) via arbitrary SQL query execution to extract sensitive data including user credentials.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References