CVE-2019-25703
Published: 12 April 2026
Summary
CVE-2019-25703 is a high-severity SQL Injection (CWE-89) vulnerability in Impresscms Impresscms. Its CVSS base score is 7.1 (High).
Operationally, ranked at the 16.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 mandates information input validation at critical entry points like the 'bid' parameter in admin.php to directly prevent SQL injection exploitation.
SI-2 requires timely identification, reporting, and remediation of flaws such as the SQL injection vulnerability in ImpressCMS 1.3.11.
RA-5 employs vulnerability scanning to detect SQL injection vulnerabilities like CVE-2019-25703 in the system.
NVD Description
ImpressCMS 1.3.11 contains a time-based blind SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the 'bid' parameter. Attackers can send POST requests to the admin.php endpoint with malicious 'bid' values containing SQL…
more
commands to extract sensitive database information.
Deeper analysisAI
CVE-2019-25703 is a time-based blind SQL injection vulnerability in ImpressCMS 1.3.11. The issue resides in the admin.php endpoint, where the 'bid' parameter is vulnerable to manipulation, allowing attackers to inject SQL code into database queries.
Authenticated attackers with low privileges can exploit this vulnerability remotely with low attack complexity and no user interaction. By sending POST requests to admin.php containing malicious 'bid' values with SQL commands, they can extract sensitive database information, resulting in high confidentiality impact, low integrity impact, and no availability impact (CVSS 7.1; AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N; CWE-89).
Advisories and references include the ImpressCMS official site, a SourceForge download for version 1.3.11, an Exploit-DB entry (46239) demonstrating the exploit, and a VulnCheck advisory detailing the SQL injection via the 'bid' parameter.
Details
- CWE(s)