Cyber Posture

CVE-2019-25524

HighPublic PoC

Published: 12 March 2026

Published
12 March 2026
Modified
23 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0025 48.1th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

XooGallery Latest contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'p' parameter. Attackers can send GET requests to results.php with malicious 'p' values to bypass authentication, extract sensitive data,…

more

or modify database contents.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection attacks by validating and sanitizing the 'p' parameter in results.php to block malicious SQL code injection.

prevent

Requires timely identification, reporting, and remediation of the SQL injection flaw in XooGallery Latest to eliminate the vulnerability.

detect

Monitors system and network activities to identify indicators of SQL injection exploitation, such as anomalous database queries via the 'p' parameter.

Security SummaryAI

CVE-2019-25524 is an SQL injection vulnerability (CWE-89) in XooGallery Latest, specifically affecting the 'p' parameter in the results.php component. This flaw enables attackers to inject malicious SQL code into database queries via GET requests. The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N) and was published on 2026-03-12T16:16:05.700.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity, requiring no privileges or user interaction. By crafting malicious 'p' values in GET requests to results.php, they can bypass authentication mechanisms, extract sensitive data from the database, or modify database contents, potentially leading to unauthorized data access or tampering.

Advisories detailing the issue are available from VulnCheck at https://www.vulncheck.com/advisories/xoogallery-lastest-latest-sql-injection-via-results-php, and a proof-of-concept exploit is published on Exploit-DB at https://www.exploit-db.com/exploits/46609. No specific patch or mitigation details are outlined in the provided references.

Details

CWE(s)

Affected Products

xooscripts
xoogallery
all versions

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing web application (T1190) directly enables unauthorized database access and extraction (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References