Cyber Posture

CVE-2019-25520

HighPublic PoC

Published: 12 March 2026

Published
12 March 2026
Modified
17 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0019 40.6th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting improper SQL query validation. Attackers can submit SQL injection payloads in the username and…

more

password fields of the admingiris.php login form to bypass authentication and access the administrative interface.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of inputs at entry points like the login form username and password fields to block SQL injection payloads that bypass authentication.

prevent

Mandates identification, reporting, and correction of flaws such as the improper SQL query validation enabling authentication bypass.

prevent

Enforces boundary protection using mechanisms like web application firewalls to monitor and block SQL injection attempts targeting the administration login form.

Security SummaryAI

CVE-2019-25520 is an authentication bypass vulnerability in Jettweb PHP Hazir Haber Sitesi Scripti V1, specifically affecting the administration panel's login form at admingiris.php. The flaw arises from improper SQL query validation (CWE-89), enabling attackers to submit SQL injection payloads in the username and password fields to circumvent authentication checks and access the administrative interface.

Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no privileges required, as indicated by the CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N). Successful exploitation grants administrative access, resulting in high confidentiality impact through potential data exposure and low integrity impact.

Advisories and references, including the Exploit-DB proof-of-concept at https://www.exploit-db.com/exploits/46597 and the Vulncheck advisory at https://www.vulncheck.com/advisories/jettweb-php-hazir-haber-sitesi-scripti-v1-authentication-bypass, document the issue but do not specify patches or mitigations in the provided details.

Details

CWE(s)

Affected Products

jettweb
php stock news site script
1

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an SQL injection in a public-facing web application's admin login, enabling unauthenticated remote exploitation for administrative access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References