CVE-2019-25439
Description
NoviSmart CMS contains an SQL injection vulnerability that allows remote attackers to execute arbitrary SQL queries by injecting malicious code through the Referer HTTP header field. Attackers can craft requests with time-based SQL injection payloads in the Referer header to extract sensitive database information or cause denial of service.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
NoviSmart CMS is vulnerable to SQL injection via the Referer HTTP header, enabling unauthenticated remote attackers to execute arbitrary SQL queries.
Vulnerability
Overview
NoviSmart CMS suffers from an SQL injection vulnerability in the handling of the HTTP Referer header. The application fails to properly sanitize user input supplied through this header before incorporating it into SQL queries. This flaw is categorized under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command) [1][2].
Exploitation
An attacker can exploit this vulnerability by crafting a malicious HTTP GET request containing time-based SQL injection payloads within the Referer header. No authentication is required, and the attack is carried out over the network. For example, a payload such as if(now()=sysdate(),sleep(0),0)/*'XOR(...) is injected directly into the Referer field [2]. The injection relies on the application logging or processing the Referer header in a database context without proper escaping.
Impact
Successful exploitation allows a remote, unauthenticated attacker to execute arbitrary SQL commands. This can lead to extraction of sensitive data from the database, including user credentials and other confidential information, as well as potential denial of service through time-based queries [1]. The CVSS v4 score is 8.2, indicating high severity with significant confidentiality impact [1].
Mitigation
As of the published advisory, all versions of NoviSmart CMS are considered vulnerable [2]. Users should apply any vendor-supplied patches or implement input validation and parameterized queries for the Referer header field. Until a fix is available, utilizing a web application firewall (WAF) to filter malicious Referer headers is recommended as a workaround.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.