Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2018-25165: SQL Injection Vulnerability Disclosed in
CVE-2018-25165: SQL Injection Vulnerability Disclosed in
SECURITYHIGHCVE-2018-25165

CVE-2018-25165: SQL Injection Vulnerability Disclosed in

A SQL injection vulnerability in Galaxy Forces MMORPG version 0.5.8 has been formally catalogued by NVD, enabling authenticated attackers to extract...

Dylan H.

Security Team

March 7, 2026
4 min read

Affected Products

  • Galaxy Forces MMORPG 0.5.8

CVE-2018-25165: SQL Injection in Galaxy Forces MMORPG 0.5.8

A SQL injection vulnerability originally identified in 2018 has been formally assigned and catalogued in the NVD database as CVE-2018-25165, with a CVSS score of 7.1 (High). The flaw resides in Galaxy Forces MMORPG version 0.5.8, an open-source browser-based massively multiplayer online role-playing game.

The vulnerability allows authenticated attackers to execute arbitrary SQL queries by injecting malicious payloads through the type parameter of the ads.php endpoint, potentially exposing sensitive database contents including user credentials, account data, and game state information.


Vulnerability Overview

AttributeValue
CVE IDCVE-2018-25165
CVSS Score7.1 (High)
CWE ClassificationCWE-89 — SQL Injection
Affected SoftwareGalaxy Forces MMORPG 0.5.8
Attack VectorNetwork
Authentication RequiredYes (authenticated attacker)
NVD PublishedMarch 6, 2026
Original Flaw Discovery2018

Technical Details

The vulnerability exists in ads.php, where the type parameter value is passed directly into a SQL query without adequate sanitization or parameterization. An authenticated user with access to the application can craft a POST request with a malicious SQL payload embedded in the type parameter, causing the underlying database to execute unintended queries.

Example attack surface:

POST /ads.php
type=<malicious SQL payload>

Successful exploitation can allow an attacker to:

  • Extract database contents — user account data, credentials, game records
  • Enumerate database structure — table names, column names, schema details
  • Read sensitive configuration — if the database user has FILE privileges, server-side files may be accessible
  • Modify game data — depending on the SQL injection type and database user privileges

Context and Impact

Galaxy Forces MMORPG is an open-source project and is unlikely to be running in large-scale production deployments in 2026. The late NVD publication of this 2018 flaw reflects the ongoing effort to formally catalogue and assign CVE identifiers to older vulnerabilities, ensuring they appear in vulnerability management databases and scanner signatures.

Who is affected:

  • Self-hosted instances of Galaxy Forces MMORPG 0.5.8 — primarily hobbyist or legacy installations
  • Any derivative forks that may have incorporated the affected ads.php code without remediation

Practical risk: Given the age and limited adoption of this software, the real-world exposure is likely low. However, SQL injection vulnerabilities in any web-accessible application carry inherent risk, and any running instances should be patched or decommissioned.


Remediation

  1. Upgrade or decommission — if running Galaxy Forces MMORPG 0.5.8, update to a patched version or take the installation offline if no longer actively maintained
  2. Apply parameterized queries — any custom deployments or forks should refactor ads.php to use prepared statements rather than direct string interpolation in SQL queries
  3. Restrict authentication — limit access to the application to trusted IP ranges if public decommissioning is not immediately feasible
  4. WAF rules — deploy web application firewall rules to detect and block SQL injection patterns against the affected endpoint

Secure coding pattern:

// Vulnerable pattern
$type = $_POST['type'];
$query = "SELECT * FROM ads WHERE type = '$type'";
 
// Secure pattern — parameterized query
$stmt = $pdo->prepare("SELECT * FROM ads WHERE type = ?");
$stmt->execute([$_POST['type']]);

Key Takeaways

  1. CVE-2018-25165 is a SQL injection flaw in Galaxy Forces MMORPG 0.5.8, now formally catalogued in NVD with CVSS 7.1 (High)
  2. Authenticated attackers can extract arbitrary database contents via the type parameter in ads.php
  3. Limited production exposure — the software is open-source with low adoption; risk is primarily relevant to legacy or self-hosted instances
  4. Remediation: Update, decommission, or refactor to use parameterized queries

Sources

  • CVE-2018-25165 — NIST NVD
#CVE-2018-25165#SQL Injection#NVD#MMORPG#Web Security#Vulnerability

Related Articles

CVE-2015-20118: Stored XSS in RealtyScript 4.0.2 Admin Interface

A stored cross-site scripting vulnerability in RealtyScript 4.0.2 allows attackers to inject malicious JavaScript via the location_name parameter in the...

4 min read

CVE-2026-3730: SQL Injection in itsourcecode Free Hotel

A remotely exploitable SQL injection vulnerability has been disclosed in itsourcecode Free Hotel Reservation System 1.0, affecting the amenities admin...

5 min read

CVE-2026-3740: SQL Injection in itsourcecode University

A high-severity SQL injection vulnerability has been disclosed in itsourcecode University Management System 1.0, allowing remote attackers to execute...

5 min read
Back to all Security Alerts