CVE-2019-25697
Published: 12 April 2026
Description
CMSsite 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cat_id parameter. Attackers can send GET requests to category.php with malicious cat_id values to extract sensitive database information including…
more
usernames and credentials.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of inputs like the cat_id parameter to prevent SQL injection attacks from manipulating database queries.
Mandates timely identification, reporting, and correction of flaws such as the SQL injection vulnerability in category.php.
Enables vulnerability scanning to identify SQL injection issues like CVE-2019-25697 in web applications prior to exploitation.
Security SummaryAI
CVE-2019-25697 is an SQL injection vulnerability in CMSsite 1.0, affecting the category.php component through the cat_id parameter. It allows attackers to inject malicious SQL code into database queries via GET requests, enabling manipulation of the underlying database. The vulnerability is classified under CWE-89 and carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low integrity impact and no availability disruption.
Unauthenticated remote attackers can exploit this vulnerability by sending crafted GET requests to category.php with malicious values in the cat_id parameter. Successful exploitation allows extraction of sensitive database information, including usernames and credentials, without requiring privileges, user interaction, or special conditions.
Advisories and resources, including those from Vulncheck (https://www.vulncheck.com/advisories/cmssite-sql-injection-via-category-php) and an Exploit-DB entry (https://www.exploit-db.com/exploits/46259), detail the issue and provide exploit code. The CMSsite source is available at https://github.com/VictorAlagwu/CMSsite/archive/master.zip; practitioners should review these for mitigation guidance, such as input validation or upgrades if patches exist.
A public exploit is available on Exploit-DB, highlighting the need for immediate scanning and patching of exposed CMSsite 1.0 instances.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web application (category.php) enables exploitation of public-facing application (T1190) and facilitates data collection from databases (T1213.006) including sensitive information like usernames and credentials.