CVE-2025-1872
Published: 03 March 2025
Summary
CVE-2025-1872 is a critical-severity SQL Injection (CWE-89) vulnerability in Mayurik Best Online News Portal. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents SQL injection by validating and sanitizing untrusted inputs like the 'sadminusername' parameter before incorporation into SQL queries.
SI-2 ensures timely identification, reporting, and correction of the specific SQL injection flaw in admin/add-subadmins.php.
RA-5 vulnerability scanning detects SQL injection vulnerabilities like CVE-2025-1872 in web applications.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote SQL injection in public-facing web app component enables exploitation of public-facing application for initial access and database compromise.
NVD Description
SQL injection vulnerability have been found in 101news affecting version 1.0 through the "sadminusername" parameter in admin/add-subadmins.php.
Deeper analysisAI
CVE-2025-1872 is a SQL injection vulnerability (CWE-89) in the 101news application, affecting version 1.0 via the "sadminusername" parameter in the admin/add-subadmins.php component. Published on 2025-03-03T13:15:12.400, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
Remote attackers require no privileges or user interaction and can exploit the issue over the network with low attack complexity. Exploitation enables high confidentiality, integrity, and availability impacts, allowing arbitrary SQL injection to potentially compromise the underlying database.
The INCIBE-CERT advisory at https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news details this and other vulnerabilities in 101news, providing guidance on mitigation measures.
Details
- CWE(s)