Cyber Posture

CVE-2019-25497

HighPublic PoC

Published: 27 February 2026

Published
27 February 2026
Modified
04 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0010 27.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

osCommerce 2.3.4.1 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the currency parameter. Attackers can send GET requests to shopping_cart.php with malicious currency values using boolean-based SQL injection payloads to…

more

extract sensitive database information.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the SQL injection vulnerability by requiring validation of the unsanitized currency parameter before its use in database queries.

prevent

Addresses the specific flaw in osCommerce 2.3.4.1 shopping_cart.php through timely identification, reporting, and patching of the SQL injection vulnerability.

prevent

Restricts the currency parameter to valid types, lengths, and values, blocking malicious boolean-based SQL injection payloads.

Security SummaryAI

CVE-2019-25497 is a SQL injection vulnerability in osCommerce version 2.3.4.1, affecting the shopping_cart.php component. The flaw arises from insufficient sanitization of the currency parameter, allowing attackers to inject malicious SQL code into database queries via GET requests. This vulnerability is classified under CWE-89 (SQL Injection) and carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high severity due to its potential for remote information disclosure.

Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By crafting boolean-based blind SQL injection payloads in the currency parameter, they can manipulate queries to extract sensitive database information, such as user credentials or other confidential data stored in the osCommerce database. The impact primarily targets confidentiality with high effect, alongside low integrity impact, but no availability disruption.

Advisories and related resources, including an Exploit-DB entry (https://www.exploit-db.com/exploits/46328) providing a proof-of-concept, the official osCommerce website (https://www.oscommerce.com), and a VulnCheck advisory (https://www.vulncheck.com/advisories/oscommerce-sql-injection-via-currency-parameter), document the issue but do not specify patch availability in the provided details. Security practitioners should verify for updates on the vendor site and apply input validation or parameterized queries as general mitigations for SQL injection risks.

Details

CWE(s)

Affected Products

oscommerce
oscommerce
≤ 2.3.4.1

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

CVE enables exploitation of public-facing web application (T1190) via unauthenticated remote SQL injection, facilitating data collection from databases (T1213.006) including sensitive information like user credentials.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References