CVE-2019-25494
Published: 27 February 2026
Description
Homey BNB V4 contains an SQL injection vulnerability in the administration panel login that allows unauthenticated attackers to bypass authentication by injecting SQL syntax into username and password fields. Attackers can submit SQL operators like '=' 'or' in both credentials…
more
to manipulate the authentication query and gain unauthorized access to the admin panel.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validation of inputs like username and password fields to ensure consistency and prevent SQL injection that bypasses admin authentication.
SI-9 restricts harmful information inputs such as SQL operators ('or', '=') into login credentials to block authentication bypass attempts.
SI-2 mandates timely remediation of the specific SQL injection flaw in the Homey BNB V4 admin panel login to eliminate the vulnerability.
Security SummaryAI
CVE-2019-25494 is an SQL injection vulnerability (CWE-89) in Homey BNB V4, an Airbnb clone script, specifically affecting the administration panel login. The flaw enables injection of SQL syntax into the username and password fields during authentication attempts. It carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with network accessibility and low attack complexity.
Unauthenticated remote attackers can exploit this vulnerability by submitting SQL operators, such as '=' or 'or', into both the username and password fields. This manipulates the underlying authentication query, allowing bypass of credentials validation and unauthorized access to the admin panel.
Advisories and related resources, including the VulnCheck advisory at https://www.vulncheck.com/advisories/homey-bnb-sql-injection-authentication-bypass-via-admin-panel and an Exploit-DB entry at https://www.exploit-db.com/exploits/46616, detail the issue; the vendor page is at https://www.doditsolutions.com/airbnb-clone-script/. Practitioners should consult these for mitigation guidance, such as input sanitization or upgrades if available.
A public exploit is available on Exploit-DB, highlighting the risk of real-world exploitation against exposed Homey BNB V4 instances. The CVE was published on 2026-02-27.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in the public-facing admin panel login enables unauthenticated remote authentication bypass, directly facilitating T1190: Exploit Public-Facing Application.