CVE-2019-25433

Source: disclosure@vulncheck.com

HIGH
8.8
Published: February 22, 2026 at 02:16 PM
Modified: February 23, 2026 at 06:13 PM

Vulnerability Description

XOOPS CMS 2.5.9 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cid parameter. Attackers can send GET requests to the gerar_pdf.php endpoint with malicious cid values to extract sensitive database information.

CVSS Metrics

Base Score
8.8
Severity
HIGH
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: disclosure@vulncheck.com

AI Security Analysis

01 // Technical Summary

XOOPS CMS 2.5.9 is vulnerable to a critical SQL injection flaw, allowing unauthenticated attackers to compromise the database. Exploitation involves injecting malicious SQL code via the cid parameter of the gerar_pdf.php endpoint, potentially leading to data exfiltration and complete system takeover.

02 // Vulnerability Mechanism

03 // Deep Technical Analysis

The vulnerability stems from insufficient input validation and sanitization of the cid parameter within the gerar_pdf.php script. Specifically, the application directly incorporates the user-supplied cid value into SQL queries without proper escaping or filtering. This allows an attacker to inject arbitrary SQL commands, manipulating the query's logic to retrieve sensitive information, such as usernames, passwords, and other database contents. The root cause is a missing or inadequate implementation of parameterized queries or prepared statements, which would have prevented the injection of malicious SQL code. The lack of input validation allows for the direct execution of attacker-controlled SQL commands, leading to a complete compromise of the database and potentially the underlying server.

04 // Exploitation Status

Public PoC

05 // Threat Intelligence

While no specific APTs are directly linked, this vulnerability is likely to be exploited by various threat actors, including those seeking to steal data or deface websites. CISA KEV: Not Listed

06 // Detection & Hunting

  • Web application firewall (WAF) logs showing suspicious GET requests to gerar_pdf.php with unusual cid parameter values.

  • Database server logs revealing unusual SQL queries originating from the web server.

  • Network traffic analysis identifying GET requests containing SQL injection payloads in the cid parameter.

  • File integrity monitoring (FIM) detecting changes to core XOOPS CMS files, particularly those related to database interaction.

  • Intrusion Detection System (IDS) alerts triggered by SQL injection signatures.

07 // Remediation & Hardening

  • Upgrade to XOOPS CMS version 2.5.10 or later, which includes a fix for this vulnerability.

  • Implement a Web Application Firewall (WAF) to filter malicious requests.

  • Implement input validation and sanitization on all user-supplied data, especially the cid parameter.

  • Use parameterized queries or prepared statements to prevent SQL injection.

  • Regularly scan the web application for vulnerabilities using automated tools.

  • Enforce the principle of least privilege for database accounts.

  • Monitor database activity for suspicious patterns.

08 // Affected Products

XOOPS CMS 2.5.9
Advertisement