Cyber Posture

CVE-2019-25494

HighPublic PoC

Published: 27 February 2026

Published
27 February 2026
Modified
13 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0042 62.1th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Homey BNB V4 contains an SQL injection vulnerability in the administration panel login that allows unauthenticated attackers to bypass authentication by injecting SQL syntax into username and password fields. Attackers can submit SQL operators like '=' 'or' in both credentials…

more

to manipulate the authentication query and gain unauthorized access to the admin panel.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of inputs like username and password fields to ensure consistency and prevent SQL injection that bypasses admin authentication.

prevent

SI-9 restricts harmful information inputs such as SQL operators ('or', '=') into login credentials to block authentication bypass attempts.

prevent

SI-2 mandates timely remediation of the specific SQL injection flaw in the Homey BNB V4 admin panel login to eliminate the vulnerability.

Security SummaryAI

CVE-2019-25494 is an SQL injection vulnerability (CWE-89) in Homey BNB V4, an Airbnb clone script, specifically affecting the administration panel login. The flaw enables injection of SQL syntax into the username and password fields during authentication attempts. It carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with network accessibility and low attack complexity.

Unauthenticated remote attackers can exploit this vulnerability by submitting SQL operators, such as '=' or 'or', into both the username and password fields. This manipulates the underlying authentication query, allowing bypass of credentials validation and unauthorized access to the admin panel.

Advisories and related resources, including the VulnCheck advisory at https://www.vulncheck.com/advisories/homey-bnb-sql-injection-authentication-bypass-via-admin-panel and an Exploit-DB entry at https://www.exploit-db.com/exploits/46616, detail the issue; the vendor page is at https://www.doditsolutions.com/airbnb-clone-script/. Practitioners should consult these for mitigation guidance, such as input sanitization or upgrades if available.

A public exploit is available on Exploit-DB, highlighting the risk of real-world exploitation against exposed Homey BNB V4 instances. The CVE was published on 2026-02-27.

Details

CWE(s)

Affected Products

doditsolutions
airbnb clone script
4

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in the public-facing admin panel login enables unauthenticated remote authentication bypass, directly facilitating T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References