CVE-2019-25457
Published: 22 February 2026
Summary
CVE-2019-25457 is a high-severity SQL Injection (CWE-89) vulnerability in Web-Ofisi Firma. Its CVSS base score is 7.5 (High).
Operationally, ranked at the 34.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
NVD Description
Web Ofisi Firma v13 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'oz' array parameter. Attackers can send GET requests to category pages with malicious 'oz[]' values using time-based…
more
blind SQL injection payloads to extract sensitive database information.
Deeper analysisAI
Web Ofisi Firma v13 is affected by CVE-2019-25457, an SQL injection vulnerability (CWE-89) in the 'oz' array parameter. This flaw allows attackers to inject malicious SQL code into database queries when processing GET requests to category pages. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with low attack complexity and no privileges required.
Unauthenticated remote attackers can exploit this vulnerability by sending crafted GET requests with malicious 'oz[]' values, such as time-based blind SQL injection payloads. Successful exploitation enables extraction of sensitive database information, potentially including user credentials, business data, or other confidential records hosted by the application.
Advisories and references, including an Exploit-DB proof-of-concept (https://www.exploit-db.com/exploits/47145) and a VulnCheck advisory (https://www.vulncheck.com/advisories/web-ofisi-firma-sql-injection-via-oz-parameter), detail the issue but do not specify patches or vendor-provided mitigations. The vendor product page (https://www.web-ofisi.com/detay/kurumsal-firma-v13-sinirsiz-dil.html) provides no remediation guidance in the available information. Security practitioners should isolate affected instances, apply input validation or prepared statements if customizing the software, and monitor for anomalous database queries.
Details
- CWE(s)