CVE-2018-25199
Published: 06 March 2026
Summary
CVE-2018-25199 is a high-severity SQL Injection (CWE-89) vulnerability in Tomalofficial Php Oop Cms Blog. Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 46.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation and sanitization of user inputs like search, pageid, and id parameters before incorporation into SQL queries.
Mandates identification, reporting, and correction of coding flaws such as the SQL injection vulnerabilities in search.php, page.php, and posts.php.
Enables vulnerability scanning to identify SQL injection flaws in web applications like OOP CMS BLOG, allowing remediation before exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing CMS enables unauthenticated remote exploitation of web application (T1190) to execute arbitrary SQL queries and collect data from databases (T1213.006).
NVD Description
OOP CMS BLOG 1.0 contains SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through multiple parameters. Attackers can inject SQL commands via the search parameter in search.php, pageid parameter in page.php, and…
more
id parameter in posts.php to extract database information including table names, schema names, and database credentials.
Deeper analysisAI
CVE-2018-25199 is a SQL injection vulnerability affecting OOP CMS BLOG version 1.0. The flaw exists in multiple parameters across PHP files, including the search parameter in search.php, pageid parameter in page.php, and id parameter in posts.php. These allow attackers to inject malicious SQL code, enabling execution of arbitrary SQL queries. The vulnerability is rated with a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N) and is associated with CWE-89.
Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no privileges required. By injecting SQL commands through the vulnerable parameters, attackers can extract sensitive database information, such as table names, schema names, and database credentials.
Advisories and a proof-of-concept exploit are documented in references including Exploit-DB (exploit 45799) and Vulncheck, which detail the SQL injection via the search parameter and other vectors. No specific patch or mitigation details are outlined in the provided CVE information.
Details
- CWE(s)