CVE-2019-25537
Published: 12 March 2026
Description
Netartmedia Event Portal 2.0 contains a time-based blind SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the Email parameter. Attackers can send POST requests to loginaction.php with malicious SQL payloads in the…
more
Email field to extract sensitive database information.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the SQL injection vulnerability by enforcing validation of the Email parameter to prevent malicious SQL payloads from being processed in database queries.
Addresses the root cause by identifying, reporting, and correcting the flaw in loginaction.php that allows insufficient input validation leading to SQL injection.
Provides boundary protection via web application firewalls or proxies to block or detect crafted POST requests containing SQL injection payloads targeting the Email parameter.
Security SummaryAI
Netartmedia Event Portal 2.0 is affected by CVE-2019-25537, a time-based blind SQL injection vulnerability (CWE-89) in the loginaction.php component. The flaw arises from insufficient input validation on the Email parameter, enabling attackers to inject malicious SQL payloads into database queries. This issue carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low integrity impact and no availability disruption.
Unauthenticated remote attackers can exploit this vulnerability by sending crafted POST requests to loginaction.php with SQL injection payloads in the Email field. Successful exploitation allows manipulation of database queries, potentially enabling extraction of sensitive information from the underlying database through time-based blind techniques.
Advisories and exploit details are documented in references such as the Exploit-DB entry at https://www.exploit-db.com/exploits/46560 and the Vulncheck advisory at https://www.vulncheck.com/advisories/netartmedia-event-portal-sql-injection-via-loginaction-php, which provide proof-of-concept exploits but do not specify patches or mitigations in the available information.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2019-25537 is a SQL injection in a public-facing web application (loginaction.php), enabling T1190 (Exploit Public-Facing Application) for unauthenticated remote access. Exploitation facilitates T1213.006 (Data from Information Repositories: Databases) via time-based blind extraction of sensitive database information.