CVE-2019-25541
Published: 12 March 2026
Description
Netartmedia PHP Mall 4.1 contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries through unvalidated parameters. Attackers can inject time-based blind SQL payloads via the 'id' parameter in index.php or the 'Email' parameter in loginaction.php to…
more
extract sensitive database information.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by validating and sanitizing untrusted inputs like the 'id' parameter in index.php and 'Email' parameter in loginaction.php before database query construction.
Remediates the specific SQL injection flaws in Netartmedia PHP Mall 4.1 through identification, correction, and testing of vulnerable code in index.php and loginaction.php.
Enforces restrictions on input parameters to limit or block malicious SQL payloads, complementing validation for the time-based blind SQL injection vectors.
Security SummaryAI
Netartmedia PHP Mall 4.1 is affected by CVE-2019-25541, a set of multiple SQL injection vulnerabilities classified under CWE-89. These flaws arise from unvalidated user inputs in specific parameters, enabling attackers to manipulate database queries. Vulnerable endpoints include the 'id' parameter in index.php and the 'Email' parameter in loginaction.php, which accept time-based blind SQL payloads without proper sanitization.
Unauthenticated remote attackers can exploit these vulnerabilities with low complexity and no user interaction required, as indicated by the CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N). Successful exploitation allows extraction of sensitive database information, such as credentials or other confidential data, through blind SQL injection techniques that infer results via query timing delays. The high confidentiality impact stems from potential data leakage, with limited integrity disruption.
Advisories from Vulncheck detail the multiple SQL injection issues and reference proof-of-concept exploits available on Exploit-DB (exploit 46562), confirming the attack vectors in index.php and loginaction.php. No patches or specific mitigation steps are outlined in the provided references, emphasizing the need for input validation, prepared statements, or upgrading to a non-vulnerable version if available.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing PHP web application directly enables T1190 (Exploit Public-Facing Application) and facilitates T1213.006 (Data from Information Repositories: Databases) via unauthorized database query manipulation and sensitive data extraction.