VYPR
High severity8.2NVD Advisory· Published Feb 22, 2026· Updated Apr 15, 2026

CVE-2019-25439

CVE-2019-25439

Description

NoviSmart CMS contains an SQL injection vulnerability that allows remote attackers to execute arbitrary SQL queries by injecting malicious code through the Referer HTTP header field. Attackers can craft requests with time-based SQL injection payloads in the Referer header to extract sensitive database information or cause denial of service.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

NoviSmart CMS is vulnerable to SQL injection via the Referer HTTP header, enabling unauthenticated remote attackers to execute arbitrary SQL queries.

Vulnerability

Overview

NoviSmart CMS suffers from an SQL injection vulnerability in the handling of the HTTP Referer header. The application fails to properly sanitize user input supplied through this header before incorporating it into SQL queries. This flaw is categorized under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command) [1][2].

Exploitation

An attacker can exploit this vulnerability by crafting a malicious HTTP GET request containing time-based SQL injection payloads within the Referer header. No authentication is required, and the attack is carried out over the network. For example, a payload such as if(now()=sysdate(),sleep(0),0)/*'XOR(...) is injected directly into the Referer field [2]. The injection relies on the application logging or processing the Referer header in a database context without proper escaping.

Impact

Successful exploitation allows a remote, unauthenticated attacker to execute arbitrary SQL commands. This can lead to extraction of sensitive data from the database, including user credentials and other confidential information, as well as potential denial of service through time-based queries [1]. The CVSS v4 score is 8.2, indicating high severity with significant confidentiality impact [1].

Mitigation

As of the published advisory, all versions of NoviSmart CMS are considered vulnerable [2]. Users should apply any vendor-supplied patches or implement input validation and parameterized queries for the Referer header field. Until a fix is available, utilizing a web application firewall (WAF) to filter malicious Referer headers is recommended as a workaround.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.