Cyber Posture

CVE-2019-25498

HighPublic PoC

Published: 04 March 2026

Published
04 March 2026
Modified
06 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0025 48.1th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the landing_location parameter. Attackers can send POST requests to the searched endpoint with malicious SQL payloads to bypass authentication…

more

and extract sensitive database information.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection by requiring validation and sanitization of the landing_location parameter at the searched endpoint before database query execution.

prevent

Mandates timely identification, reporting, and correction of the specific SQL injection flaw in the Simple Job Script application.

prevent

Enforces restrictions on input format and content for the landing_location parameter to block malicious SQL payloads at the critical entry point.

Security SummaryAI

CVE-2019-25498 is an SQL injection vulnerability (CWE-89) in Simple Job Script, affecting the searched endpoint. The flaw arises from improper handling of the landing_location parameter, which allows attackers to inject malicious SQL code into database queries. It carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low attack complexity and no privileges required.

Unauthenticated attackers can exploit this vulnerability remotely by sending POST requests to the searched endpoint with SQL payloads in the landing_location parameter. Successful exploitation enables manipulation of database queries to bypass authentication mechanisms and extract sensitive information from the database.

Advisories and proof-of-concept exploits are available at https://www.exploit-db.com/exploits/46612 and https://www.vulncheck.com/advisories/simple-job-script-sql-injection-via-searched-endpoint, which detail the vulnerability and potential exploitation paths.

Details

CWE(s)

Affected Products

simplejobscript
simplejobscript
≤ 1.66

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

CVE-2019-25498 is an unauthenticated SQL injection in a public-facing web application endpoint, directly enabling T1190 (Exploit Public-Facing Application). Exploitation facilitates arbitrary database queries for data extraction, mapping to T1213.006 (Data from Information Repositories: Databases).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References