Unauthenticated SQLi Threatens CMSsite 1.0
The National Vulnerability Database (NVD) recently highlighted CVE-2019-25697, a high-severity SQL injection vulnerability affecting CMSsite version 1.0. This isn’t some newfangled zero-day, but it’s a critical reminder that older, unpatched software remains a prime target for low-hanging fruit attacks. According to the NVD, this flaw allows unauthenticated attackers to manipulate database queries by injecting malicious SQL code via the cat_id parameter in category.php.
What does that mean for you? A threat actor can simply send a GET request with a specially crafted cat_id value to extract sensitive database information. We’re talking usernames, credentials, and potentially other juicy data. With a CVSS score of 8.2 (HIGH), this vulnerability is a straight shot for data exfiltration, making it a significant risk for any organization still running this particular flavor of CMS.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 5 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2019-25697
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2019-25697 | SQLi | CMSsite 1.0 |
| CVE-2019-25697 | SQLi | Vulnerable file: category.php |
| CVE-2019-25697 | SQLi | Vulnerable parameter: cat_id |
| CVE-2019-25697 | SQLi | Attack vector: GET request to category.php with malicious cat_id |