Cyber Posture

CVE-2019-25533

HighPublic PoC

Published: 12 March 2026

Published
12 March 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0031 53.7th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Netartmedia PHP Business Directory 4.2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the Email parameter. Attackers can send POST requests to the loginaction.php endpoint with crafted SQL payloads in…

more

the Email field to extract sensitive database information or bypass authentication.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of untrusted inputs like the Email parameter in loginaction.php to block SQL injection payloads.

prevent

Mandates identification, reporting, and correction of flaws such as this SQL injection vulnerability through patching or code remediation.

detect

Requires vulnerability scanning to identify SQL injection issues like CVE-2019-25533 in web applications for timely remediation.

Security SummaryAI

CVE-2019-25533 is an SQL injection vulnerability (CWE-89) affecting Netartmedia PHP Business Directory version 4.2. The issue occurs in the loginaction.php endpoint, where the Email parameter is vulnerable to manipulation, enabling attackers to inject SQL code into database queries.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no privileges or user interaction required, earning it a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N). By sending POST requests to loginaction.php with crafted SQL payloads in the Email field, attackers can extract sensitive database information or bypass authentication.

Details on the vulnerability, including an exploit, are documented in references such as https://www.exploit-db.com/exploits/46577 and https://www.vulncheck.com/advisories/netartmedia-php-business-directory-sql-injection-via-loginaction-php.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing web application (loginaction.php) enables exploitation of public-facing application (T1190) and extraction of sensitive data from databases (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References