Cyber Posture

CVE-2019-25510

HighPublic PoC

Published: 12 March 2026

Published
12 March 2026
Modified
17 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0019 40.6th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting improper SQL query validation. Attackers can submit SQL injection payloads in the username and…

more

password fields of the admingiris.php login form to bypass authentication and access the administrative interface.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the improper SQL query validation by requiring input validation mechanisms on the admingiris.php login form to block SQL injection payloads.

prevent

Mandates timely identification, reporting, and remediation of the SQL injection flaw enabling authentication bypass in the administration panel.

prevent

Enforces restrictions on username and password inputs to the login form, limiting payload types that could exploit the SQL injection vulnerability.

Security SummaryAI

CVE-2019-25510 is an authentication bypass vulnerability in Jettweb PHP Hazir Haber Sitesi Scripti V2, stemming from improper SQL query validation in the administration panel. The flaw affects the admingiris.php login form, where attackers can inject SQL payloads into the username and password fields to circumvent authentication checks, as classified under CWE-89 (SQL Injection). The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high severity due to network accessibility and no prerequisites for exploitation.

Unauthenticated remote attackers can exploit this vulnerability by submitting crafted SQL injection payloads during login attempts, bypassing credentials validation and gaining full administrative access to the interface. Successful exploitation grants attackers elevated privileges, enabling potential data manipulation, user management, content control, and other admin functions, with high confidentiality impact and low integrity impact but no availability disruption.

Advisories and references, including an Exploit-DB entry (https://www.exploit-db.com/exploits/46598) providing a proof-of-concept and a Vulncheck advisory (https://www.vulncheck.com/advisories/jettweb-php-hazir-haber-sitesi-scripti-v2-authentication-bypass), document the issue but do not specify available patches or vendor mitigations in the provided details. Security practitioners should verify input sanitization in login forms and apply general SQL injection defenses like prepared statements until updates are confirmed.

Details

CWE(s)

Affected Products

jettweb
php stock news site script
2

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an SQL injection in a public-facing web application's admin login panel, enabling unauthenticated attackers to bypass authentication and gain admin access, directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References