Cyber Posture

CVE-2019-25457

HighPublic PoC

Published: 22 February 2026

Published
22 February 2026
Modified
02 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0015 34.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2019-25457 is a high-severity SQL Injection (CWE-89) vulnerability in Web-Ofisi Firma. Its CVSS base score is 7.5 (High).

Operationally, ranked at the 34.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-89

Penetration testing uses SQL injection payloads against database interfaces, identifying and supporting fixes for SQL injection weaknesses.

addresses: CWE-89

Validates query inputs to prevent SQL syntax or command manipulation.

NVD Description

Web Ofisi Firma v13 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'oz' array parameter. Attackers can send GET requests to category pages with malicious 'oz[]' values using time-based…

more

blind SQL injection payloads to extract sensitive database information.

Deeper analysisAI

Web Ofisi Firma v13 is affected by CVE-2019-25457, an SQL injection vulnerability (CWE-89) in the 'oz' array parameter. This flaw allows attackers to inject malicious SQL code into database queries when processing GET requests to category pages. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with low attack complexity and no privileges required.

Unauthenticated remote attackers can exploit this vulnerability by sending crafted GET requests with malicious 'oz[]' values, such as time-based blind SQL injection payloads. Successful exploitation enables extraction of sensitive database information, potentially including user credentials, business data, or other confidential records hosted by the application.

Advisories and references, including an Exploit-DB proof-of-concept (https://www.exploit-db.com/exploits/47145) and a VulnCheck advisory (https://www.vulncheck.com/advisories/web-ofisi-firma-sql-injection-via-oz-parameter), detail the issue but do not specify patches or vendor-provided mitigations. The vendor product page (https://www.web-ofisi.com/detay/kurumsal-firma-v13-sinirsiz-dil.html) provides no remediation guidance in the available information. Security practitioners should isolate affected instances, apply input validation or prepared statements if customizing the software, and monitor for anomalous database queries.

Details

CWE(s)

Affected Products

web-ofisi
firma
13.0.0

CVEs Like This One

CVE-2019-25458Same vendor: Web-Ofisi
CVE-2019-25459Same vendor: Web-Ofisi
CVE-2019-25461Same vendor: Web-Ofisi
CVE-2019-25456Same vendor: Web-Ofisi
CVE-2019-25460Same vendor: Web-Ofisi
CVE-2019-25455Same vendor: Web-Ofisi
CVE-2018-25210Same vendor: Web-Ofisi
CVE-2026-2094Shared CWE-89
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89

References