CVE-2019-25506
Published: 04 March 2026
Description
FreeSMS 2.1.2 contains a boolean-based blind SQL injection vulnerability in the password parameter that allows unauthenticated attackers to bypass authentication by injecting SQL code through the login endpoint. Attackers can exploit the vulnerable password parameter in requests to /pages/crc_handler.php?method=login to…
more
authenticate as any known user and subsequently modify their password via the profile update function.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validation of information inputs like the vulnerable password parameter, directly preventing SQL injection exploitation.
SI-2 mandates timely identification, reporting, and correction of flaws such as this SQL injection vulnerability in FreeSMS.
SC-7 enforces boundary protection that can inspect and block SQL injection payloads targeting the login endpoint via web application firewalls.
Security SummaryAI
FreeSMS version 2.1.2 is affected by CVE-2019-25506, a boolean-based blind SQL injection vulnerability in the password parameter of the login endpoint at /pages/crc_handler.php?method=login. This CWE-89 flaw enables unauthenticated attackers to inject SQL code, bypassing authentication checks. The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), reflecting high confidentiality impact, low integrity impact, and no availability impact.
Unauthenticated remote attackers can exploit this vulnerability with low attack complexity and no user interaction. By crafting requests to the vulnerable login endpoint, attackers can authenticate as any known user account and then leverage the profile update function to modify that user's password, potentially gaining persistent access.
Advisories and references, including an Exploit-DB entry at https://www.exploit-db.com/exploits/46658 and a Vulncheck advisory at https://www.vulncheck.com/advisories/freesms-authentication-bypass-via-sql-injection, detail the authentication bypass via SQL injection but do not specify patches or mitigations in the provided CVE information. Security practitioners should review these sources for exploit details and consider upgrading or implementing input validation on affected instances.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a SQL injection in a public-facing web application login endpoint, enabling unauthenticated attackers to bypass authentication, directly mapping to T1190: Exploit Public-Facing Application.