CVE-2019-9053
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
26/03/2019
Last modified:
17/11/2025
Description
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.8:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/152356/CMS-Made-Simple-SQL-Injection.html
- https://github.com/Perseus99999/CVE-2019-9053-working-/blob/main/exploit.py
- https://newsletter.cmsmadesimple.org/w/89247Qog4jCRCuRinvhsofwg
- https://www.cmsmadesimple.org/2019/03/Announcing-CMS-Made-Simple-v2.2.10-Spuzzum
- https://www.exploit-db.com/exploits/46635/
- http://packetstormsecurity.com/files/152356/CMS-Made-Simple-SQL-Injection.html
- https://newsletter.cmsmadesimple.org/w/89247Qog4jCRCuRinvhsofwg
- https://www.cmsmadesimple.org/2019/03/Announcing-CMS-Made-Simple-v2.2.10-Spuzzum
- https://www.exploit-db.com/exploits/46635/



