Cyber Posture

CVE-2019-25697

HighPublic PoC

Published: 12 April 2026

Published
12 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0024 47.6th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

CMSsite 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cat_id parameter. Attackers can send GET requests to category.php with malicious cat_id values to extract sensitive database information including…

more

usernames and credentials.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of inputs like the cat_id parameter to prevent SQL injection attacks from manipulating database queries.

prevent

Mandates timely identification, reporting, and correction of flaws such as the SQL injection vulnerability in category.php.

detect

Enables vulnerability scanning to identify SQL injection issues like CVE-2019-25697 in web applications prior to exploitation.

Security SummaryAI

CVE-2019-25697 is an SQL injection vulnerability in CMSsite 1.0, affecting the category.php component through the cat_id parameter. It allows attackers to inject malicious SQL code into database queries via GET requests, enabling manipulation of the underlying database. The vulnerability is classified under CWE-89 and carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low integrity impact and no availability disruption.

Unauthenticated remote attackers can exploit this vulnerability by sending crafted GET requests to category.php with malicious values in the cat_id parameter. Successful exploitation allows extraction of sensitive database information, including usernames and credentials, without requiring privileges, user interaction, or special conditions.

Advisories and resources, including those from Vulncheck (https://www.vulncheck.com/advisories/cmssite-sql-injection-via-category-php) and an Exploit-DB entry (https://www.exploit-db.com/exploits/46259), detail the issue and provide exploit code. The CMSsite source is available at https://github.com/VictorAlagwu/CMSsite/archive/master.zip; practitioners should review these for mitigation guidance, such as input validation or upgrades if patches exist.

A public exploit is available on Exploit-DB, highlighting the need for immediate scanning and patching of exposed CMSsite 1.0 instances.

Details

CWE(s)

Affected Products

victoralagwu
cmssite
1.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing web application (category.php) enables exploitation of public-facing application (T1190) and facilitates data collection from databases (T1213.006) including sensitive information like usernames and credentials.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References