CVE-2019-25575
Published: 21 March 2026
Description
SimplePress CMS 1.0.7 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'p' and 's' parameters. Attackers can send GET requests with crafted SQL payloads to extract sensitive database…
more
information including usernames, database names, and version details.
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of user inputs in 'p' and 's' parameters to directly prevent SQL injection attacks from executing arbitrary queries.
Mandates timely identification, reporting, and remediation of flaws like this SQL injection vulnerability in SimplePress CMS 1.0.7.
Boundary protection at external interfaces can inspect and block crafted SQL payloads in unauthenticated GET requests to the CMS.
Security SummaryAI
CVE-2019-25575 is an SQL injection vulnerability in SimplePress CMS version 1.0.7, classified under CWE-89. It enables unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'p' and 's' parameters in GET requests. The vulnerability has a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low integrity impact and no availability impact. Affected software is hosted on SourceForge, with the vulnerable 1.0.7 alpha version available for download.
Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no privileges required. By sending crafted GET requests containing SQL payloads via the 'p' and 's' parameters, attackers can extract sensitive database information, such as usernames, database names, and version details.
Advisories and resources, including those from Vulncheck detailing the SQL injection via 'p' and 's' parameters, provide further technical analysis. An exploit is publicly available on Exploit-DB (ID 46235), demonstrating practical exploitation paths. The SourceForge project page and direct download link for the vulnerable archive offer context for verification and analysis. No specific patches are mentioned in available details.
Details
- CWE(s)