Cyber Posture

CVE-2019-25532

HighPublic PoC

Published: 12 March 2026

Published
12 March 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0031 53.7th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Netartmedia Jobs Portal 6.1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the Email parameter. Attackers can send POST requests to loginaction.php with crafted SQL payloads in the Email field…

more

to extract sensitive database information or bypass authentication.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents SQL injection by requiring validation and sanitization of untrusted inputs like the Email parameter in loginaction.php.

prevent

SI-2 mandates timely identification, reporting, and correction of flaws such as the SQL injection vulnerability in loginaction.php.

prevent

SC-7 provides boundary protection via mechanisms like web application firewalls to monitor and block malicious SQL payloads in POST requests to loginaction.php.

Security SummaryAI

CVE-2019-25532 is an SQL injection vulnerability (CWE-89) affecting Netartmedia Jobs Portal version 6.1. The issue occurs in the loginaction.php component, where the Email parameter in POST requests is not properly sanitized, enabling attackers to inject arbitrary SQL code into database queries. This flaw was published on 2026-03-12 with a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high severity due to network accessibility, low complexity, and no privileges required.

Unauthenticated remote attackers can exploit the vulnerability by sending POST requests to loginaction.php containing crafted SQL payloads in the Email field. Exploitation allows manipulation of database queries to extract sensitive information or bypass authentication mechanisms.

Reference advisories include an Exploit-DB entry (https://www.exploit-db.com/exploits/46575) providing a proof-of-concept and a VulnCheck advisory (https://www.vulncheck.com/advisories/netartmedia-jobs-portal-sql-injection-via-loginaction-php) detailing the SQL injection via loginaction.php. No specific patches are mentioned in the CVE details.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection vulnerability in public-facing web application's login component directly enables exploitation of public-facing applications (T1190) and unauthorized data collection from databases (T1213.006) via crafted queries.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References