Cyber Posture

CVE-2019-25528

HighPublic PoC

Published: 12 March 2026

Published
12 March 2026
Modified
19 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0017 37.8th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the property1 parameter. Attackers can send POST requests to the search/searchdetailed endpoint with malicious SQL payloads to…

more

extract sensitive data or modify database contents.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection exploitation by validating and sanitizing the property1 parameter before its use in database queries.

prevent

Requires identification, prioritization, and remediation of the SQL injection flaw in the search/searchdetailed endpoint through patching or code fixes.

preventdetect

Detects the SQL injection vulnerability via vulnerability scanning and drives risk-based remediation to prevent exploitation.

Security SummaryAI

CVE-2019-25528 is an SQL injection vulnerability in Inout EasyRooms Ultimate Edition v1.0. The flaw occurs through the property1 parameter in the search/searchdetailed endpoint, where insufficient input sanitization allows attackers to inject arbitrary SQL code into database queries. This CWE-89 issue carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high severity due to network accessibility, low complexity, and no privileges required.

Unauthenticated remote attackers can exploit this vulnerability by sending crafted POST requests to the search/searchdetailed endpoint with malicious SQL payloads in the property1 parameter. Successful exploitation enables manipulation of database queries, allowing extraction of sensitive data such as user credentials or other confidential information, as well as limited modification of database contents.

Advisories from VulnCheck detail the SQL injection via the search endpoint, while Exploit-DB provides a public proof-of-concept exploit (ID 46630) demonstrating the attack. No patches or specific mitigations are detailed in the provided references.

Details

CWE(s)

Affected Products

inoutscripts
inout homestay
1.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing web application enables exploitation of public-facing apps (T1190) and direct database query manipulation for data extraction (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References