VYPR
High severity8.2NVD Advisory· Published Feb 22, 2026· Updated Apr 15, 2026

CVE-2019-25433

CVE-2019-25433

Description

XOOPS CMS 2.5.9 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cid parameter. Attackers can send GET requests to the gerar_pdf.php endpoint with malicious cid values to extract sensitive database information.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

XOOPS CMS 2.5.9 is vulnerable to unauthenticated SQL injection in the gerar_pdf.php endpoint via the cid parameter, allowing data extraction.

Vulnerability

Overview

CVE-2019-25433 describes an SQL injection vulnerability in XOOPS CMS version 2.5.9. The flaw resides in the gerar_pdf.php script, which fails to sanitize the cid parameter before incorporating it into database queries. This allows an attacker to inject arbitrary SQL code through a GET request, bypassing authentication requirements entirely [1].

Exploitation

An unauthenticated attacker can exploit this vulnerability by sending a crafted GET request to the vulnerable endpoint, such as http://host/patch/modules/patch/gerar_pdf.php?cid=[SQL Injection]. No prior authentication or special privileges are needed, making the attack surface broad. The exploit is publicly available and has been demonstrated on both Windows and Linux platforms [1].

Impact

Successful exploitation enables the attacker to extract sensitive information from the underlying database, including user credentials, session data, and other confidential records. The CVSS v3 score of 8.2 (High) reflects the ease of exploitation and the potential for significant data compromise.

Mitigation

As of the publication date, no official patch has been released for XOOPS CMS 2.5.9. Users are advised to upgrade to a later version of XOOPS if available, or to apply input validation and parameterized queries as a workaround. The vulnerability is listed in public exploit databases, increasing the risk of active exploitation [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.