CVE-2019-25703

high

Description

ImpressCMS 1.3.11 contains a time-based blind SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the 'bid' parameter. Attackers can send POST requests to the admin.php endpoint with malicious 'bid' values containing SQL commands to extract sensitive database information.

References

https://www.vulncheck.com/advisories/impresscms-sql-injection-via-bid-parameter

https://www.exploit-db.com/exploits/46239

https://sourceforge.net/projects/impresscms/files/v1.3.11/impresscms_1.3.11.zip

http://www.impresscms.org/

Details

Source: Mitre, NVD

Published: 2026-04-12

Updated: 2026-04-12

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:P/A:N

Severity: High

CVSS v3

Base Score: 7.1

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

Severity: High

CVSS v4

Base Score: 7.1

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N

Severity: High