Unauthenticated SQLi Threatens CMSsite 1.0

Unauthenticated SQLi Threatens CMSsite 1.0

The National Vulnerability Database (NVD) recently highlighted CVE-2019-25697, a high-severity SQL injection vulnerability affecting CMSsite version 1.0. This isn’t some newfangled zero-day, but it’s a critical reminder that older, unpatched software remains a prime target for low-hanging fruit attacks. According to the NVD, this flaw allows unauthenticated attackers to manipulate database queries by injecting malicious SQL code via the cat_id parameter in category.php.

What does that mean for you? A threat actor can simply send a GET request with a specially crafted cat_id value to extract sensitive database information. We’re talking usernames, credentials, and potentially other juicy data. With a CVSS score of 8.2 (HIGH), this vulnerability is a straight shot for data exfiltration, making it a significant risk for any organization still running this particular flavor of CMS.

Related ATT&CK Techniques

🛡️ Detection Rules

4 rules · 5 SIEM formats

4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2019-25697

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2019-25697 SQLi CMSsite 1.0
CVE-2019-25697 SQLi Vulnerable file: category.php
CVE-2019-25697 SQLi Vulnerable parameter: cat_id
CVE-2019-25697 SQLi Attack vector: GET request to category.php with malicious cat_id

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs