ImpressCMS 1.3.11 Time-Based Blind SQL Injection Vulnerability
ImpressCMS 1.3.11 contains a time-based blind SQL injection vulnerability allowing authenticated attackers to manipulate database queries by injecting SQL code through the 'bid' parameter via POST requests to the admin.php endpoint.
ImpressCMS is an open-source content management system. Version 1.3.11 is vulnerable to a time-based blind SQL injection vulnerability (CVE-2019-25703). An authenticated attacker can exploit this vulnerability by injecting malicious SQL code into the ‘bid’ parameter. Successful exploitation allows the attacker to manipulate database queries, potentially leading to the extraction of sensitive information. This vulnerability requires authentication, limiting the scope of potential attackers, but the impact can be severe if exploited successfully. The vulnerability was reported and disclosed in April 2026.
Attack Chain
- The attacker authenticates to the ImpressCMS application with valid credentials.
- The attacker crafts a malicious POST request targeting the
admin.phpendpoint. - The POST request includes the
bidparameter containing SQL injection payload designed to cause a time delay. - The ImpressCMS application processes the POST request without proper sanitization of the
bidparameter. - The injected SQL code is executed against the underlying database, causing a time-based delay.
- The attacker monitors the response time to confirm successful injection.
- The attacker refines the SQL injection payload to extract sensitive information from the database using techniques like
SLEEP()and conditional queries. - The attacker exfiltrates the sensitive data obtained from the database.
Impact
Successful exploitation of this vulnerability allows an attacker to read sensitive data from the ImpressCMS database. This may include user credentials, configuration details, and other confidential information. While the exploit requires authentication, a successful attack could lead to complete compromise of the application and its data, potentially impacting all users and the integrity of the website. The CVSS v3.1 score of 7.1 reflects the high potential impact of this vulnerability.
Recommendation
- Apply the necessary patches or upgrade to a version of ImpressCMS that addresses CVE-2019-25703 to remediate the SQL injection vulnerability.
- Deploy the provided Sigma rule to detect malicious POST requests containing SQL injection attempts targeting the
admin.phpendpoint. - Implement input validation and sanitization on the
bidparameter within the ImpressCMS application to prevent SQL injection attacks. - Monitor web server logs for suspicious POST requests to
admin.phpwith unusual parameters, as this can be an indicator of exploitation attempts. - Review and restrict access to the
admin.phpendpoint to only authorized users to minimize the attack surface.
Detection coverage 2
Detect ImpressCMS SQL Injection Attempt via bid Parameter
highDetects potential SQL injection attempts in ImpressCMS admin.php via the 'bid' parameter based on common SQL syntax.
Detect ImpressCMS SQL Injection Attempt via bid Parameter - Error Based
mediumDetects potential SQL injection attempts in ImpressCMS admin.php via the 'bid' parameter based on common SQL error generation syntax.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
4
url
| Type | Value |
|---|---|
| url | http://www.impresscms.org/ |
| url | https://sourceforge.net/projects/impresscms/files/v1.3.11/impresscms_1.3.11.zip |
| url | https://www.exploit-db.com/exploits/46239 |
| url | https://www.vulncheck.com/advisories/impresscms-sql-injection-via-bid-parameter |
| [email protected] |