<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2019-25703 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2019-25703/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 12 Apr 2026 13:16:33 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2019-25703/feed.xml" rel="self" type="application/rss+xml"/><item><title>ImpressCMS 1.3.11 Time-Based Blind SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-impresscms-sqli/</link><pubDate>Sun, 12 Apr 2026 13:16:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-impresscms-sqli/</guid><description>ImpressCMS 1.3.11 contains a time-based blind SQL injection vulnerability allowing authenticated attackers to manipulate database queries by injecting SQL code through the 'bid' parameter via POST requests to the admin.php endpoint.</description><content:encoded><![CDATA[<p>ImpressCMS is an open-source content management system. Version 1.3.11 is vulnerable to a time-based blind SQL injection vulnerability (CVE-2019-25703). An authenticated attacker can exploit this vulnerability by injecting malicious SQL code into the &lsquo;bid&rsquo; parameter. Successful exploitation allows the attacker to manipulate database queries, potentially leading to the extraction of sensitive information. This vulnerability requires authentication, limiting the scope of potential attackers, but the impact can be severe if exploited successfully. The vulnerability was reported and disclosed in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the ImpressCMS application with valid credentials.</li>
<li>The attacker crafts a malicious POST request targeting the <code>admin.php</code> endpoint.</li>
<li>The POST request includes the <code>bid</code> parameter containing SQL injection payload designed to cause a time delay.</li>
<li>The ImpressCMS application processes the POST request without proper sanitization of the <code>bid</code> parameter.</li>
<li>The injected SQL code is executed against the underlying database, causing a time-based delay.</li>
<li>The attacker monitors the response time to confirm successful injection.</li>
<li>The attacker refines the SQL injection payload to extract sensitive information from the database using techniques like <code>SLEEP()</code> and conditional queries.</li>
<li>The attacker exfiltrates the sensitive data obtained from the database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to read sensitive data from the ImpressCMS database. This may include user credentials, configuration details, and other confidential information. While the exploit requires authentication, a successful attack could lead to complete compromise of the application and its data, potentially impacting all users and the integrity of the website. The CVSS v3.1 score of 7.1 reflects the high potential impact of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the necessary patches or upgrade to a version of ImpressCMS that addresses CVE-2019-25703 to remediate the SQL injection vulnerability.</li>
<li>Deploy the provided Sigma rule to detect malicious POST requests containing SQL injection attempts targeting the <code>admin.php</code> endpoint.</li>
<li>Implement input validation and sanitization on the <code>bid</code> parameter within the ImpressCMS application to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious POST requests to <code>admin.php</code> with unusual parameters, as this can be an indicator of exploitation attempts.</li>
<li>Review and restrict access to the <code>admin.php</code> endpoint to only authorized users to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>impresscms</category><category>cve-2019-25703</category></item></channel></rss>