VYPR
High severity8.2NVD Advisory· Published Mar 24, 2026· Updated May 1, 2026

CVE-2019-25642

CVE-2019-25642

Description

Bootstrapy CMS contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through POST parameters. Attackers can inject SQL payloads into the thread_id parameter of forum-thread.php, the subject parameter of contact-submit.php, the post-id parameter of post-new-submit.php, and the thread-id parameter to extract sensitive database information or cause denial of service.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Bootstrapy CMS has multiple SQL injection vulnerabilities in POST parameters allowing unauthenticated attackers to execute arbitrary SQL queries.

Vulnerability

Bootstrapy CMS contains multiple SQL injection vulnerabilities in its forum and contact modules. The application fails to sanitize user-supplied input passed via POST parameters, allowing unauthenticated attackers to inject arbitrary SQL queries. The affected parameters include thread_id in forum-thread.php, subject in contact-submit.php, post-id in post-new-submit.php, and thread-id in post-new-submit.php [1][2].

Exploitation

An attacker can exploit these vulnerabilities by sending crafted POST requests to the vulnerable endpoints. No authentication is required. For example, injecting 'XOR(if(now()=sysdate(),sleep(5),0))XOR'Z into the thread_id parameter of forum-thread.php triggers a time-based SQL injection that indicates successful injection [1]. Similar patterns apply to the other parameters.

Impact

Successful exploitation allows attackers to extract sensitive database information (such as user credentials or application data) or cause a denial of service by executing resource-intensive queries. The CVSS v3 score of 8.2 (High) reflects the potential for information disclosure and service disruption.

Mitigation

The vendor has not released a patch, and the project appears to be inactive. As a workaround, administrators should restrict access to the vulnerable modules or implement input validation and parameterized queries. The vulnerability is publicly exploit-ready, and proof-of-concept code is available [1][2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.