CVE-2019-25499
Published: 04 March 2026
Description
Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the job_id parameter. Attackers can send POST requests to get_job_applications_ajax.php with malicious job_id values to bypass authentication, extract sensitive…
more
data, or modify database contents.
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of the job_id parameter to block malicious SQL code injection in POST requests to get_job_applications_ajax.php.
Mandates identification, reporting, and remediation of the SQL injection flaw in the Simple Job Script component.
Enforces restrictions on job_id inputs such as format, length, or allowed values to limit SQL injection payloads.
Security SummaryAI
CVE-2019-25499 is an SQL injection vulnerability (CWE-89) in Simple Job Script, specifically affecting the get_job_applications_ajax.php component. The flaw allows attackers to inject malicious SQL code through the job_id parameter in POST requests, enabling manipulation of database queries. It carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N) and was published on 2026-03-04T18:16:08.260.
Unauthenticated attackers with network access can exploit this vulnerability by sending crafted POST requests to get_job_applications_ajax.php containing malicious job_id values. Successful exploitation allows bypassing authentication controls, extracting sensitive data from the database, or modifying database contents, with high confidentiality impact and low integrity impact.
Advisories and related resources, including the VulnCheck advisory at https://www.vulncheck.com/advisories/simple-job-script-sql-injection-via-get-job-applications-ajaxphp and an exploit proof-of-concept at https://www.exploit-db.com/exploits/46612, provide further details on the issue and potential mitigations.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2019-25499 is an unauthenticated SQL injection in a public-facing web application (T1190), enabling direct database query manipulation for sensitive data extraction (T1213.006).