CVE-2019-25699
Published: 12 April 2026
Summary
CVE-2019-25699 is a high-severity SQL Injection (CWE-89) vulnerability in Gurkanuzunca Newsbull. Its CVSS base score is 7.1 (High).
Operationally, ranked at the 1.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation of untrusted inputs like the search parameter before incorporation into database queries.
Ensures timely identification, reporting, and remediation of the specific SQL injection flaw in admin endpoints to eliminate the vulnerability.
Facilitates automated scanning and analysis to detect SQL injection vulnerabilities in web applications like Newsbull Haber Script and initiate remediation.
NVD Description
Newsbull Haber Script 1.0.0 contains multiple SQL injection vulnerabilities in the search parameter that allow authenticated attackers to extract database information through time-based, blind, and boolean-based injection techniques. Attackers can inject malicious SQL code through the search parameter in endpoints…
more
like /admin/comment/records, /admin/category/records, /admin/news/records, and /admin/menu/childs to manipulate database queries and retrieve sensitive data.
Deeper analysisAI
Newsbull Haber Script version 1.0.0 is affected by multiple SQL injection vulnerabilities (CWE-89) in the search parameter across several admin endpoints, including /admin/comment/records, /admin/category/records, /admin/news/records, and /admin/menu/childs. These flaws allow attackers to inject malicious SQL code, enabling manipulation of database queries through time-based, blind, and boolean-based techniques to extract sensitive database information. The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low requirements for privileges and complexity.
Authenticated attackers with low privileges, such as standard admin users, can exploit this vulnerability remotely over the network without user interaction. By submitting crafted payloads in the search parameter, they can achieve data exfiltration, including retrieval of sensitive information from the database, while also enabling limited integrity modifications but without impacting availability.
Advisories from sources like Vulncheck document the authenticated SQL injection via the search parameter, and a proof-of-concept exploit is publicly available on Exploit-DB (ID 46266). The project's GitHub repository and official site at newsbull.org provide additional context, though no patches or specific mitigation steps are detailed in the available references.
Details
- CWE(s)