CVE-2019-25539
Published: 12 March 2026
Description
202CMS v10 beta contains a blind SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the log_user parameter. Attackers can send POST requests to index.php with crafted SQL payloads using time-based blind injection…
more
techniques to extract sensitive database information.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents blind SQL injection by requiring validation of the log_user parameter in POST requests to block malicious SQL payloads.
Ensures timely remediation of the specific SQL injection flaw in 202CMS v10 beta to eliminate the vulnerability.
Enables vulnerability scanning to identify and remediate SQL injection flaws like CVE-2019-25539 before exploitation.
Security SummaryAI
CVE-2019-25539 is a blind SQL injection vulnerability in 202CMS v10 beta, stemming from CWE-89. The flaw resides in the log_user parameter, enabling attackers to inject malicious SQL code into database queries processed via POST requests to index.php. This affects the content management system's backend database handling, with a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact, low integrity impact, and no availability disruption.
Unauthenticated remote attackers can exploit this vulnerability by crafting POST requests to index.php with time-based blind SQL injection payloads. Successful exploitation allows extraction of sensitive database information, such as user credentials or configuration data, through inference techniques that measure query response times without direct output.
Advisories and related resources include the project page at https://sourceforge.net/projects/b202cms/, a public exploit at https://www.exploit-db.com/exploits/46579, and a detailed advisory from VulnCheck at https://www.vulncheck.com/advisories/202cms-v10-beta-sql-injection-via-register-php. No patches or specific mitigation steps are detailed in the CVE description.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Blind SQLi in public-facing CMS enables exploitation of public app (T1190), credential extraction from DB (T1212), and data collection from databases (T1213.006).