Cyber Posture

CVE-2019-25537

HighPublic PoC

Published: 12 March 2026

Published
12 March 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0012 30.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Netartmedia Event Portal 2.0 contains a time-based blind SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the Email parameter. Attackers can send POST requests to loginaction.php with malicious SQL payloads in the…

more

Email field to extract sensitive database information.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the SQL injection vulnerability by enforcing validation of the Email parameter to prevent malicious SQL payloads from being processed in database queries.

prevent

Addresses the root cause by identifying, reporting, and correcting the flaw in loginaction.php that allows insufficient input validation leading to SQL injection.

preventdetect

Provides boundary protection via web application firewalls or proxies to block or detect crafted POST requests containing SQL injection payloads targeting the Email parameter.

Security SummaryAI

Netartmedia Event Portal 2.0 is affected by CVE-2019-25537, a time-based blind SQL injection vulnerability (CWE-89) in the loginaction.php component. The flaw arises from insufficient input validation on the Email parameter, enabling attackers to inject malicious SQL payloads into database queries. This issue carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low integrity impact and no availability disruption.

Unauthenticated remote attackers can exploit this vulnerability by sending crafted POST requests to loginaction.php with SQL injection payloads in the Email field. Successful exploitation allows manipulation of database queries, potentially enabling extraction of sensitive information from the underlying database through time-based blind techniques.

Advisories and exploit details are documented in references such as the Exploit-DB entry at https://www.exploit-db.com/exploits/46560 and the Vulncheck advisory at https://www.vulncheck.com/advisories/netartmedia-event-portal-sql-injection-via-loginaction-php, which provide proof-of-concept exploits but do not specify patches or mitigations in the available information.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

CVE-2019-25537 is a SQL injection in a public-facing web application (loginaction.php), enabling T1190 (Exploit Public-Facing Application) for unauthenticated remote access. Exploitation facilitates T1213.006 (Data from Information Repositories: Databases) via time-based blind extraction of sensitive database information.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References