Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51065: n/a

0
Critical
VulnerabilityCVE-2024-51065cvecve-2024-51065
Published: Thu Oct 31 2024 (10/31/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Phpgurukul Beauty Parlour Management System v1.1 is vulnerable to SQL Injection in admin/index.php via the the username parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 02:45:00 UTC

Technical Analysis

The vulnerability identified as CVE-2024-51065 affects the Phpgurukul Beauty Parlour Management System version 1.1. It is an SQL Injection vulnerability located in the admin/index.php script, specifically through the username parameter. SQL Injection (CWE-89) occurs when user-supplied input is improperly sanitized before being incorporated into SQL queries, allowing attackers to manipulate the query structure. In this case, the lack of input validation or parameterization enables remote attackers to inject malicious SQL code without any authentication or user interaction. The CVSS v3.1 score of 9.8 reflects the vulnerability's critical severity, with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this vulnerability could allow attackers to extract sensitive data, modify or delete database records, or escalate privileges within the system. Although no patches or known exploits are currently reported, the vulnerability's presence in a web-facing admin interface makes it a high-value target. The vulnerability was reserved and published in late October 2024, indicating recent discovery. The absence of patch links suggests that the vendor has not yet released a fix, increasing the urgency for organizations to apply mitigations or consider alternative solutions.

Potential Impact

The potential impact of CVE-2024-51065 is severe for organizations using the affected Beauty Parlour Management System. Successful exploitation can lead to full compromise of the underlying database, exposing sensitive customer and business data, including personal information and transaction records. Attackers could alter or delete critical data, disrupting business operations and causing financial and reputational damage. The vulnerability also enables attackers to potentially execute arbitrary commands on the backend if the database is linked to other system components, leading to broader system compromise. Given the administrative context of the vulnerable parameter, attackers might gain elevated privileges or persistent access. The lack of authentication requirements and user interaction means attacks can be automated and launched at scale, increasing the risk of widespread exploitation. Small and medium businesses relying on this software may lack the resources to detect or respond effectively, amplifying the threat. Additionally, regulatory compliance issues may arise from data breaches caused by this vulnerability.

Mitigation Recommendations

To mitigate CVE-2024-51065, organizations should immediately implement input validation and sanitization on all user-supplied data, especially the username parameter in admin/index.php. Employing prepared statements with parameterized queries is critical to prevent SQL Injection. If source code modification is not feasible, deploying a Web Application Firewall (WAF) with rules to detect and block SQL Injection attempts can provide interim protection. Restricting access to the admin interface via IP whitelisting or VPN can reduce exposure. Regularly monitoring logs for suspicious SQL syntax or unusual access patterns is recommended. Organizations should also maintain regular backups of databases to enable recovery in case of data corruption or deletion. Engaging with the software vendor for patches or updates is essential once available. Finally, consider migrating to more secure and actively maintained management systems if remediation is delayed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ba8b7ef31ef0b5579c0

Added to database: 2/25/2026, 9:37:44 PM

Last enriched: 2/28/2026, 2:45:00 AM

Last updated: 4/12/2026, 1:55:57 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses