CVE-2019-25520

High
|8.8
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows attackers to gain full administrative access to the PHP stock news site script without needing a valid username or password. They can exploit this by entering specially crafted input in the login form, which tricks the system into bypassing security checks.

Technical Description

Jettweb PHP Hazir Haber Sitesi Scripti V1 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting improper SQL query validation. Attackers can submit SQL injection payloads in the username and password fields of the admingiris.php login form to bypass authentication and access the administrative interface.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$4,789($1K-$5K)
Vendor Response
Grade APatched in 5 days

Quick Information

Published

Mar 12, 2026

26 days ago

Last Modified

Mar 17, 2026

21 days ago

Vendor

jettweb

Product

php stock news site script

Related Vulnerabilities

CVE-2019-25519High

This vulnerability allows attackers to manipulate database queries and extract sensitive information by sending specially crafted requests to a specific page in the Jettweb PHP stock news site script. It requires the attacker to send POST requests with malicious input in a certain parameter, making it possible to execute harmful SQL commands.

CVE-2019-25518High

This vulnerability allows attackers to send specially crafted requests to a specific page of the Jettweb PHP script, enabling them to access or change sensitive information in the database without needing to log in. The only requirement is that they must be able to send a POST request with malicious code in a specific parameter.

CVE-2019-25517High

This vulnerability allows attackers to access or change sensitive information in the database by sending specially crafted requests to the script without needing to log in. They can exploit this flaw by manipulating a specific part of the URL, which lets them run harmful SQL commands.

CVE-2019-25516High

This vulnerability allows attackers to access sensitive information from the database by sending specially crafted requests to the website, specifically through a parameter called gallery_id. The attacker does not need to log in or have any special permissions, making it easy for anyone to exploit this flaw.

CVE-2019-25515High

This vulnerability allows attackers to gain unauthorized access to the administration panel of a PHP stock news site script without needing valid login credentials. They can exploit this by entering specific SQL commands in the username and password fields, making it easy for anyone to take control if they know how to craft the right input.