Cyber Posture

CVE-2019-25535

HighPublic PoC

Published: 12 March 2026

Published
12 March 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0012 30.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Netartmedia PHP Dating Site contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the Email parameter. Attackers can send POST requests to loginaction.php with time-based SQL injection payloads in the Email…

more

field to extract sensitive database information.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection by requiring validation of untrusted inputs like the Email parameter in loginaction.php before incorporation into database queries.

prevent

Mandates identification, reporting, and correction of the specific SQL injection flaw in loginaction.php to eliminate the vulnerability.

prevent

Boundary protection devices such as web application firewalls can inspect and block malicious SQL payloads in POST requests to loginaction.php.

Security SummaryAI

CVE-2019-25535 is a SQL injection vulnerability (CWE-89) in the Netartmedia PHP Dating Site, affecting the loginaction.php component. The flaw enables attackers to inject malicious SQL code through the Email parameter in POST requests, allowing manipulation of database queries. It carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low attack complexity and no privileges required.

Unauthenticated remote attackers can exploit this vulnerability by sending crafted POST requests to loginaction.php, using time-based SQL injection payloads in the Email field to extract sensitive database information. Successful exploitation grants access to confidential data without requiring user interaction or authentication.

Advisories and exploit details are documented in references such as Exploit-DB (https://www.exploit-db.com/exploits/46576) and Vulncheck (https://www.vulncheck.com/advisories/netartmedia-php-dating-site-sql-injection-via-loginaction-php), which describe the vulnerability but do not specify patches or mitigations in the available information.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing loginaction.php enables unauthenticated exploitation of public-facing applications (T1190) and extraction of sensitive data from databases (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References