CVE-2019-25528
Published: 12 March 2026
Summary
CVE-2019-25528 is a high-severity SQL Injection (CWE-89) vulnerability in Inoutscripts Inout Homestay. Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection exploitation by validating and sanitizing the property1 parameter before its use in database queries.
Requires identification, prioritization, and remediation of the SQL injection flaw in the search/searchdetailed endpoint through patching or code fixes.
Detects the SQL injection vulnerability via vulnerability scanning and drives risk-based remediation to prevent exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web application enables exploitation of public-facing apps (T1190) and direct database query manipulation for data extraction (T1213.006).
NVD Description
Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the property1 parameter. Attackers can send POST requests to the search/searchdetailed endpoint with malicious SQL payloads to…
more
extract sensitive data or modify database contents.
Deeper analysisAI
CVE-2019-25528 is an SQL injection vulnerability in Inout EasyRooms Ultimate Edition v1.0. The flaw occurs through the property1 parameter in the search/searchdetailed endpoint, where insufficient input sanitization allows attackers to inject arbitrary SQL code into database queries. This CWE-89 issue carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high severity due to network accessibility, low complexity, and no privileges required.
Unauthenticated remote attackers can exploit this vulnerability by sending crafted POST requests to the search/searchdetailed endpoint with malicious SQL payloads in the property1 parameter. Successful exploitation enables manipulation of database queries, allowing extraction of sensitive data such as user credentials or other confidential information, as well as limited modification of database contents.
Advisories from VulnCheck detail the SQL injection via the search endpoint, while Exploit-DB provides a public proof-of-concept exploit (ID 46630) demonstrating the attack. No patches or specific mitigations are detailed in the provided references.
Details
- CWE(s)