Cyber Posture

CVE-2019-25703

HighPublic PoC

Published: 12 April 2026

Published
12 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.0005 16.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2019-25703 is a high-severity SQL Injection (CWE-89) vulnerability in Impresscms Impresscms. Its CVSS base score is 7.1 (High).

Operationally, ranked at the 16.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 mandates information input validation at critical entry points like the 'bid' parameter in admin.php to directly prevent SQL injection exploitation.

prevent

SI-2 requires timely identification, reporting, and remediation of flaws such as the SQL injection vulnerability in ImpressCMS 1.3.11.

detect

RA-5 employs vulnerability scanning to detect SQL injection vulnerabilities like CVE-2019-25703 in the system.

NVD Description

ImpressCMS 1.3.11 contains a time-based blind SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the 'bid' parameter. Attackers can send POST requests to the admin.php endpoint with malicious 'bid' values containing SQL…

more

commands to extract sensitive database information.

Deeper analysisAI

CVE-2019-25703 is a time-based blind SQL injection vulnerability in ImpressCMS 1.3.11. The issue resides in the admin.php endpoint, where the 'bid' parameter is vulnerable to manipulation, allowing attackers to inject SQL code into database queries.

Authenticated attackers with low privileges can exploit this vulnerability remotely with low attack complexity and no user interaction. By sending POST requests to admin.php containing malicious 'bid' values with SQL commands, they can extract sensitive database information, resulting in high confidentiality impact, low integrity impact, and no availability impact (CVSS 7.1; AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N; CWE-89).

Advisories and references include the ImpressCMS official site, a SourceForge download for version 1.3.11, an Exploit-DB entry (46239) demonstrating the exploit, and a VulnCheck advisory detailing the SQL injection via the 'bid' parameter.

Details

CWE(s)

Affected Products

impresscms
impresscms
1.3.11

CVEs Like This One

CVE-2022-50912Same product: Impresscms Impresscms
CVE-2026-2094Shared CWE-89
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89
CVE-2026-23492Shared CWE-89
CVE-2024-12016Shared CWE-89
CVE-2025-26200Shared CWE-89
CVE-2019-25541Shared CWE-89
CVE-2024-57629Shared CWE-89
CVE-2019-25699Shared CWE-89

References