Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

675+ Articles
119+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2019-25709: CF Image Hosting Script 1.6.5 Database Exposure and Unauthorized Deletion
CVE-2019-25709: CF Image Hosting Script 1.6.5 Database Exposure and Unauthorized Deletion

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2019-25709

CVE-2019-25709: CF Image Hosting Script 1.6.5 Database Exposure and Unauthorized Deletion

A critical unauthenticated vulnerability in CF Image Hosting Script 1.6.5 allows attackers to download the application database, extract plaintext delete IDs, and delete all hosted images without authentication.

Dylan H.

Security Team

April 13, 2026
4 min read

Affected Products

  • CF Image Hosting Script 1.6.5

Overview

CVE-2019-25709 is a critical severity vulnerability (CVSS 9.8) affecting CF Image Hosting Script version 1.6.5. The flaw enables unauthenticated remote attackers to directly access and download the application's SQLite database file, extract sensitive delete IDs stored in plaintext, and leverage those IDs to permanently delete all images hosted on the service.

This vulnerability was published to the National Vulnerability Database (NVD) on April 12, 2026, and affects any publicly accessible deployment of CF Image Hosting Script 1.6.5 that has not applied mitigations.


Technical Details

Vulnerability Type

  • CWE Classification: Improper Access Control / Information Disclosure
  • CVSS Score: 9.8 (Critical)
  • Attack Vector: Network (remote, unauthenticated)
  • Authentication Required: None

How the Attack Works

The application stores its database file at a predictable and publicly accessible path:

/upload/data/imgdb.db

An attacker can issue a simple HTTP GET request to retrieve the entire SQLite database without any credentials or session tokens. Once downloaded, the database can be deserialized using standard SQLite tooling to expose all stored records.

Within this database, image delete IDs are stored in plaintext. These IDs are the only authorization mechanism protecting image deletion. An attacker who obtains them can submit requests to delete any or all images hosted on the platform — effectively wiping the entire service.

Attack chain summary:

  1. Attacker sends GET /upload/data/imgdb.db to the target server
  2. Server returns the full SQLite database without authentication
  3. Attacker deserializes database, extracts plaintext delete IDs
  4. Attacker submits deletion requests using extracted IDs
  5. All hosted images are deleted — no credentials required

Impact

Impact AreaSeverity
ConfidentialityHigh — Full database exposure
IntegrityHigh — All images can be destroyed
AvailabilityHigh — Complete content deletion possible

Any operator running CF Image Hosting Script 1.6.5 with the default configuration is at risk of:

  • Complete data theft: All image metadata, URLs, and delete credentials exposed
  • Irreversible content deletion: Hosted images can be wiped by any remote actor
  • Reputational damage: Users relying on the platform for image hosting lose all content

Affected Versions

ProductAffected VersionFixed Version
CF Image Hosting Script1.6.5Not confirmed — upgrade recommended

Remediation

Immediate Mitigations

  1. Restrict web server access to the database file. Add a server-level rule to block HTTP access to *.db files in the upload/data/ directory.

    Apache (.htaccess):

    <FilesMatch "\.db$">
        Order Allow,Deny
        Deny from all
    </FilesMatch>

    Nginx:

    location ~* \.db$ {
        deny all;
        return 403;
    }
  2. Move the database outside the web root. Store imgdb.db in a directory not served by the web server, then update application configuration to reference the new path.

  3. Rotate delete IDs. Treat all existing delete IDs as compromised. Regenerate credentials if the application supports it.

  4. Audit server access logs. Review HTTP access logs for GET /upload/data/imgdb.db requests that may indicate prior exploitation.

  5. Consider migrating to a maintained alternative. CF Image Hosting Script 1.6.5 appears to be an unmaintained project. Evaluate supported alternatives for production image hosting.


References

  • NVD Entry — CVE-2019-25709
  • CVSS v3.1 Score: 9.8 Critical
  • Published: April 12, 2026

Disclosure Timeline

DateEvent
2019 (original discovery)Vulnerability initially identified in CF Image Hosting Script 1.6.5
April 12, 2026Published to National Vulnerability Database (NVD)

This advisory is published for informational and defensive purposes. If you operate CF Image Hosting Script, apply the mitigations above immediately.

#CVE#NVD#Vulnerability#SQLite#File Exposure#Unauthenticated

Related Articles

CVE-2019-25693: ResourceSpace 8.6 SQL Injection via collection_edit.php Keywords Parameter

ResourceSpace 8.6 contains an authenticated SQL injection vulnerability in collection_edit.php that allows attackers to execute arbitrary SQL queries by injecting payloads through the keywords parameter, enabling extraction of sensitive database contents.

4 min read

CVE-2026-35392: Critical Path Traversal in goshs Go HTTP Server

A critical CVSS 9.8 path traversal vulnerability in goshs, a SimpleHTTPServer written in Go, allows unauthenticated attackers to write arbitrary files via...

4 min read

CVE-2026-5637: SQL Injection in projectworlds Car Rental System 1.0

A remotely exploitable SQL injection vulnerability (CVE-2026-5637) has been disclosed in projectworlds Car Rental System 1.0. The flaw exists in...

4 min read
Back to all Security Alerts