Cyber Posture

CVE-2019-25699

HighPublic PoC

Published: 12 April 2026

Published
12 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0001 1.2th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2019-25699 is a high-severity SQL Injection (CWE-89) vulnerability in Gurkanuzunca Newsbull. Its CVSS base score is 7.1 (High).

Operationally, ranked at the 1.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection by requiring validation of untrusted inputs like the search parameter before incorporation into database queries.

prevent

Ensures timely identification, reporting, and remediation of the specific SQL injection flaw in admin endpoints to eliminate the vulnerability.

detectrespond

Facilitates automated scanning and analysis to detect SQL injection vulnerabilities in web applications like Newsbull Haber Script and initiate remediation.

NVD Description

Newsbull Haber Script 1.0.0 contains multiple SQL injection vulnerabilities in the search parameter that allow authenticated attackers to extract database information through time-based, blind, and boolean-based injection techniques. Attackers can inject malicious SQL code through the search parameter in endpoints…

more

like /admin/comment/records, /admin/category/records, /admin/news/records, and /admin/menu/childs to manipulate database queries and retrieve sensitive data.

Deeper analysisAI

Newsbull Haber Script version 1.0.0 is affected by multiple SQL injection vulnerabilities (CWE-89) in the search parameter across several admin endpoints, including /admin/comment/records, /admin/category/records, /admin/news/records, and /admin/menu/childs. These flaws allow attackers to inject malicious SQL code, enabling manipulation of database queries through time-based, blind, and boolean-based techniques to extract sensitive database information. The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low requirements for privileges and complexity.

Authenticated attackers with low privileges, such as standard admin users, can exploit this vulnerability remotely over the network without user interaction. By submitting crafted payloads in the search parameter, they can achieve data exfiltration, including retrieval of sensitive information from the database, while also enabling limited integrity modifications but without impacting availability.

Advisories from sources like Vulncheck document the authenticated SQL injection via the search parameter, and a proof-of-concept exploit is publicly available on Exploit-DB (ID 46266). The project's GitHub repository and official site at newsbull.org provide additional context, though no patches or specific mitigation steps are detailed in the available references.

Details

CWE(s)

Affected Products

gurkanuzunca
newsbull
1.0.0

CVEs Like This One

CVE-2026-2094Shared CWE-89
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89
CVE-2026-23492Shared CWE-89
CVE-2024-12016Shared CWE-89
CVE-2025-26200Shared CWE-89
CVE-2019-25541Shared CWE-89
CVE-2024-57629Shared CWE-89
CVE-2025-49050Shared CWE-89
CVE-2024-57616Shared CWE-89

References