CVE-2025-1869
Published: 03 March 2025
Summary
CVE-2025-1869 is a critical-severity SQL Injection (CWE-89) vulnerability in Mayurik Best Online News Portal. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents SQL injection by requiring validation and sanitization of the untrusted 'username' parameter before its use in database queries within admin/check_avalability.php.
SI-2 requires identification, prioritization, and remediation of the specific SQL injection flaw in 101news version 1.0, eliminating the vulnerability through patching or code correction.
SI-9 restricts the 'username' parameter to organization-defined safe formats and characters, blocking SQL injection payloads from reaching the vulnerable endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote exploitation of a public-facing web app via unauthenticated SQL injection (CWE-89) in admin/check_avalability.php.
NVD Description
SQL injection vulnerability have been found in 101news affecting version 1.0 through the "username" parameter in admin/check_avalability.php.
Deeper analysisAI
CVE-2025-1869 is a SQL injection vulnerability (CWE-89) discovered in the 101news software, affecting version 1.0 via the "username" parameter in the admin/check_avalability.php component. Published on 2025-03-03T13:15:11.950, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for widespread remote exploitation.
Remote, unauthenticated attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation enables high-impact consequences across confidentiality, integrity, and availability, allowing arbitrary SQL code execution to extract sensitive data, modify database contents, or disrupt service availability.
The INCIBE advisory at https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news provides details on this and related vulnerabilities in 101news, including recommended mitigations.
Details
- CWE(s)