Cyber Posture

CVE-2019-25506

HighPublic PoC

Published: 04 March 2026

Published
04 March 2026
Modified
09 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0033 56.0th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

FreeSMS 2.1.2 contains a boolean-based blind SQL injection vulnerability in the password parameter that allows unauthenticated attackers to bypass authentication by injecting SQL code through the login endpoint. Attackers can exploit the vulnerable password parameter in requests to /pages/crc_handler.php?method=login to…

more

authenticate as any known user and subsequently modify their password via the profile update function.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of information inputs like the vulnerable password parameter, directly preventing SQL injection exploitation.

prevent

SI-2 mandates timely identification, reporting, and correction of flaws such as this SQL injection vulnerability in FreeSMS.

preventdetect

SC-7 enforces boundary protection that can inspect and block SQL injection payloads targeting the login endpoint via web application firewalls.

Security SummaryAI

FreeSMS version 2.1.2 is affected by CVE-2019-25506, a boolean-based blind SQL injection vulnerability in the password parameter of the login endpoint at /pages/crc_handler.php?method=login. This CWE-89 flaw enables unauthenticated attackers to inject SQL code, bypassing authentication checks. The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), reflecting high confidentiality impact, low integrity impact, and no availability impact.

Unauthenticated remote attackers can exploit this vulnerability with low attack complexity and no user interaction. By crafting requests to the vulnerable login endpoint, attackers can authenticate as any known user account and then leverage the profile update function to modify that user's password, potentially gaining persistent access.

Advisories and references, including an Exploit-DB entry at https://www.exploit-db.com/exploits/46658 and a Vulncheck advisory at https://www.vulncheck.com/advisories/freesms-authentication-bypass-via-sql-injection, detail the authentication bypass via SQL injection but do not specify patches or mitigations in the provided CVE information. Security practitioners should review these sources for exploit details and consider upgrading or implementing input validation on affected instances.

Details

CWE(s)

Affected Products

freesms project
freesms
≤ 2.1.2

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a SQL injection in a public-facing web application login endpoint, enabling unauthenticated attackers to bypass authentication, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References