Cyber Posture

CVE-2019-25528

HighPublic PoC

Published: 12 March 2026

Published
12 March 2026
Modified
19 March 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0018 38.9th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2019-25528 is a high-severity SQL Injection (CWE-89) vulnerability in Inoutscripts Inout Homestay. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection exploitation by validating and sanitizing the property1 parameter before its use in database queries.

prevent

Requires identification, prioritization, and remediation of the SQL injection flaw in the search/searchdetailed endpoint through patching or code fixes.

preventdetect

Detects the SQL injection vulnerability via vulnerability scanning and drives risk-based remediation to prevent exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing web application enables exploitation of public-facing apps (T1190) and direct database query manipulation for data extraction (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the property1 parameter. Attackers can send POST requests to the search/searchdetailed endpoint with malicious SQL payloads to…

more

extract sensitive data or modify database contents.

Deeper analysisAI

CVE-2019-25528 is an SQL injection vulnerability in Inout EasyRooms Ultimate Edition v1.0. The flaw occurs through the property1 parameter in the search/searchdetailed endpoint, where insufficient input sanitization allows attackers to inject arbitrary SQL code into database queries. This CWE-89 issue carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high severity due to network accessibility, low complexity, and no privileges required.

Unauthenticated remote attackers can exploit this vulnerability by sending crafted POST requests to the search/searchdetailed endpoint with malicious SQL payloads in the property1 parameter. Successful exploitation enables manipulation of database queries, allowing extraction of sensitive data such as user credentials or other confidential information, as well as limited modification of database contents.

Advisories from VulnCheck detail the SQL injection via the search endpoint, while Exploit-DB provides a public proof-of-concept exploit (ID 46630) demonstrating the attack. No patches or specific mitigations are detailed in the provided references.

Details

CWE(s)

Affected Products

inoutscripts
inout homestay
1.0

CVEs Like This One

CVE-2019-25526Same product: Inoutscripts Inout Homestay
CVE-2019-25527Same product: Inoutscripts Inout Homestay
CVE-2019-25525Same product: Inoutscripts Inout Homestay
CVE-2025-40639Shared CWE-89
CVE-2019-25674Shared CWE-89
CVE-2019-25524Shared CWE-89
CVE-2025-23780Shared CWE-89
CVE-2026-40887Shared CWE-89
CVE-2024-51818Shared CWE-89
CVE-2026-31891Shared CWE-89

References