VYPR
High severity8.2NVD Advisory· Published Mar 24, 2026· Updated May 1, 2026

CVE-2019-25640

CVE-2019-25640

Description

Inout Article Base CMS contains SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries through the 'p' and 'u' parameters. Attackers can inject SQL code using XOR-based payloads in GET requests to portalLogin.php to extract sensitive database information or cause denial of service through time-based attacks.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Inout Article Base CMS is vulnerable to unauthenticated SQL injection via the 'p' and 'u' parameters in portalLogin.php, allowing data extraction or denial of service.

Vulnerability

Overview

Inout Article Base CMS contains SQL injection vulnerabilities in the portalLogin.php script. The application fails to properly sanitize user-supplied input passed through the p and u GET parameters, allowing an attacker to inject arbitrary SQL commands. The official description and advisory confirm that the injection can be performed using XOR-based payloads to bypass weak filters or authentication logic [1][2].

Exploitation

Details

An unauthenticated attacker can exploit this vulnerability by sending crafted GET requests to portalLogin.php. The proof-of-concept published on Exploit-DB demonstrates two injection points: one in the p parameter and another in the u parameter. The payload uses an XOR technique combined with conditional time-based functions (e.g., if(now()=sysdate(),sleep(0),0)) to infer database information or cause delays. No authentication or special network position is required, as the script is accessible to any remote user [3].

Impact

Successful exploitation allows an attacker to extract sensitive data from the underlying database, such as user credentials or user credentials, or to perform time-based denial of service by causing application unresponsiveness. The CVSS v3 score of 8.2 (High) reflects the ease of exploitation and the potential for high confidentiality impact [2].

Mitigation

Status

As of the publication date, no official patch has been released by the vendor, and the affected version range remains undefined. Users are advised to apply input validation and parameterized queries as a workaround, or consider migrating to an alternative solution if the product is no longer maintained [1][2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.