Cyber Posture

CVE-2019-25697

HighPublic PoC

Published: 12 April 2026

Published
12 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0027 50.1th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2019-25697 is a high-severity SQL Injection (CWE-89) vulnerability in Victoralagwu Cmssite. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 49.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of inputs like the cat_id parameter to prevent SQL injection attacks from manipulating database queries.

prevent

Mandates timely identification, reporting, and correction of flaws such as the SQL injection vulnerability in category.php.

detect

Enables vulnerability scanning to identify SQL injection issues like CVE-2019-25697 in web applications prior to exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing web application (category.php) enables exploitation of public-facing application (T1190) and facilitates data collection from databases (T1213.006) including sensitive information like usernames and credentials.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

CMSsite 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cat_id parameter. Attackers can send GET requests to category.php with malicious cat_id values to extract sensitive database information including…

more

usernames and credentials.

Deeper analysisAI

CVE-2019-25697 is an SQL injection vulnerability in CMSsite 1.0, affecting the category.php component through the cat_id parameter. It allows attackers to inject malicious SQL code into database queries via GET requests, enabling manipulation of the underlying database. The vulnerability is classified under CWE-89 and carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low integrity impact and no availability disruption.

Unauthenticated remote attackers can exploit this vulnerability by sending crafted GET requests to category.php with malicious values in the cat_id parameter. Successful exploitation allows extraction of sensitive database information, including usernames and credentials, without requiring privileges, user interaction, or special conditions.

Advisories and resources, including those from Vulncheck (https://www.vulncheck.com/advisories/cmssite-sql-injection-via-category-php) and an Exploit-DB entry (https://www.exploit-db.com/exploits/46259), detail the issue and provide exploit code. The CMSsite source is available at https://github.com/VictorAlagwu/CMSsite/archive/master.zip; practitioners should review these for mitigation guidance, such as input validation or upgrades if patches exist.

A public exploit is available on Exploit-DB, highlighting the need for immediate scanning and patching of exposed CMSsite 1.0 instances.

Details

CWE(s)

Affected Products

victoralagwu
cmssite
1.0

CVEs Like This One

CVE-2019-25674Same product: Victoralagwu Cmssite
CVE-2025-40639Shared CWE-89
CVE-2019-25526Shared CWE-89
CVE-2019-25524Shared CWE-89
CVE-2025-23780Shared CWE-89
CVE-2026-40887Shared CWE-89
CVE-2024-51818Shared CWE-89
CVE-2026-31891Shared CWE-89
CVE-2026-30951Shared CWE-89
CVE-2025-32303Shared CWE-89

References