CVE-2019-25509
Published: 12 March 2026
Description
XooDigital Latest contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'p' parameter. Attackers can send GET requests to results.php with malicious 'p' values to extract sensitive database information.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation of the malicious 'p' parameter before it is used in database queries.
Requires identification, reporting, and correction of the SQL injection flaw in results.php to eliminate the vulnerability.
Enables monitoring of system activities to detect unauthorized database query manipulations from SQL injection attempts via the 'p' parameter.
Security SummaryAI
CVE-2019-25509 is an SQL injection vulnerability (CWE-89) in XooDigital Latest, affecting the results.php component. The flaw allows attackers to inject SQL code through the 'p' parameter in GET requests, enabling manipulation of database queries. It has a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high severity due to network accessibility, low attack complexity, no privileges required, and significant confidentiality impact with minor integrity impact.
Unauthenticated attackers can exploit this vulnerability remotely by sending crafted GET requests to results.php with malicious values in the 'p' parameter. Successful exploitation allows extraction of sensitive database information, such as user credentials or other confidential data stored in the backend database.
Advisories and related resources, including an exploit on Exploit-DB (https://www.exploit-db.com/exploits/46610) and a VulnCheck advisory (https://www.vulncheck.com/advisories/xoodigital-lastest-latest-sql-injection-via-results-php), document the issue but do not specify mitigation steps or patches in the available details.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web application (results.php) enables unauthenticated remote exploitation (T1190) for extracting sensitive data from databases, including credentials (T1213.006).