Cyber Posture

CVE-2019-25509

HighPublic PoC

Published: 12 March 2026

Published
12 March 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0012 30.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

XooDigital Latest contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'p' parameter. Attackers can send GET requests to results.php with malicious 'p' values to extract sensitive database information.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection by requiring validation of the malicious 'p' parameter before it is used in database queries.

prevent

Requires identification, reporting, and correction of the SQL injection flaw in results.php to eliminate the vulnerability.

detect

Enables monitoring of system activities to detect unauthorized database query manipulations from SQL injection attempts via the 'p' parameter.

Security SummaryAI

CVE-2019-25509 is an SQL injection vulnerability (CWE-89) in XooDigital Latest, affecting the results.php component. The flaw allows attackers to inject SQL code through the 'p' parameter in GET requests, enabling manipulation of database queries. It has a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high severity due to network accessibility, low attack complexity, no privileges required, and significant confidentiality impact with minor integrity impact.

Unauthenticated attackers can exploit this vulnerability remotely by sending crafted GET requests to results.php with malicious values in the 'p' parameter. Successful exploitation allows extraction of sensitive database information, such as user credentials or other confidential data stored in the backend database.

Advisories and related resources, including an exploit on Exploit-DB (https://www.exploit-db.com/exploits/46610) and a VulnCheck advisory (https://www.vulncheck.com/advisories/xoodigital-lastest-latest-sql-injection-via-results-php), document the issue but do not specify mitigation steps or patches in the available details.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing web application (results.php) enables unauthenticated remote exploitation (T1190) for extracting sensitive data from databases, including credentials (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References