CVE-2025-10402: SQL Injection in PHPGurukul Beauty Parlour Management System
A flaw has been found in PHPGurukul Beauty Parlour Management System 1.1. The impacted element is an unknown function of the file /admin/readenq.php. Executing manipulation of the argument delid can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2025-10402 is a SQL Injection vulnerability identified in version 1.1 of the PHPGurukul Beauty Parlour Management System. The vulnerability resides in an unspecified function within the /admin/readenq.php file, specifically involving the manipulation of the 'delid' parameter. An attacker can remotely exploit this flaw by injecting malicious SQL code through the 'delid' argument without requiring any authentication or user interaction. The vulnerability allows an attacker to interfere with the application's database queries, potentially leading to unauthorized data access, data modification, or deletion. The CVSS 4.0 base score is 6.9 (medium severity), reflecting that the attack vector is network-based (remote), with low complexity and no privileges or user interaction needed. The impact on confidentiality, integrity, and availability is limited but present, as indicated by the partial impact ratings in the CVSS vector. No official patch or mitigation has been published yet, and while no known exploits are currently observed in the wild, the existence of a public exploit increases the risk of exploitation. The vulnerability is critical for organizations relying on this specific management system, especially those handling sensitive customer or business data within the beauty and wellness sector.
Potential Impact
For European organizations using PHPGurukul Beauty Parlour Management System 1.1, this vulnerability poses a significant risk of unauthorized database access and manipulation. Successful exploitation could lead to leakage of sensitive customer information, including personal data, appointment details, and payment information, potentially violating GDPR requirements. Data integrity could be compromised, affecting business operations and customer trust. Availability impacts could arise if attackers delete or corrupt database records, disrupting service continuity. Given the remote exploitability without authentication, attackers can target vulnerable systems over the internet, increasing the attack surface. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise but still represents a substantial threat to confidentiality and integrity. Organizations in Europe must consider the regulatory and reputational consequences of such data breaches, especially in countries with strict data protection enforcement.
Mitigation Recommendations
Immediate mitigation steps include implementing input validation and parameterized queries or prepared statements in the affected /admin/readenq.php script to sanitize the 'delid' parameter and prevent SQL injection. Organizations should conduct a thorough code review of the application to identify and remediate similar injection points. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block SQL injection attempts targeting this parameter. Restricting access to the /admin directory via IP whitelisting or VPN access can reduce exposure. Regular backups of the database should be maintained to enable recovery in case of data corruption. Monitoring and logging database queries and application logs for suspicious activity can aid in early detection. Since no official patch is currently available, organizations should engage with the vendor for updates or consider upgrading to a newer, secure version if available. Additionally, conducting penetration testing focused on injection vulnerabilities will help ensure comprehensive protection.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-10402: SQL Injection in PHPGurukul Beauty Parlour Management System
Description
A flaw has been found in PHPGurukul Beauty Parlour Management System 1.1. The impacted element is an unknown function of the file /admin/readenq.php. Executing manipulation of the argument delid can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10402 is a SQL Injection vulnerability identified in version 1.1 of the PHPGurukul Beauty Parlour Management System. The vulnerability resides in an unspecified function within the /admin/readenq.php file, specifically involving the manipulation of the 'delid' parameter. An attacker can remotely exploit this flaw by injecting malicious SQL code through the 'delid' argument without requiring any authentication or user interaction. The vulnerability allows an attacker to interfere with the application's database queries, potentially leading to unauthorized data access, data modification, or deletion. The CVSS 4.0 base score is 6.9 (medium severity), reflecting that the attack vector is network-based (remote), with low complexity and no privileges or user interaction needed. The impact on confidentiality, integrity, and availability is limited but present, as indicated by the partial impact ratings in the CVSS vector. No official patch or mitigation has been published yet, and while no known exploits are currently observed in the wild, the existence of a public exploit increases the risk of exploitation. The vulnerability is critical for organizations relying on this specific management system, especially those handling sensitive customer or business data within the beauty and wellness sector.
Potential Impact
For European organizations using PHPGurukul Beauty Parlour Management System 1.1, this vulnerability poses a significant risk of unauthorized database access and manipulation. Successful exploitation could lead to leakage of sensitive customer information, including personal data, appointment details, and payment information, potentially violating GDPR requirements. Data integrity could be compromised, affecting business operations and customer trust. Availability impacts could arise if attackers delete or corrupt database records, disrupting service continuity. Given the remote exploitability without authentication, attackers can target vulnerable systems over the internet, increasing the attack surface. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise but still represents a substantial threat to confidentiality and integrity. Organizations in Europe must consider the regulatory and reputational consequences of such data breaches, especially in countries with strict data protection enforcement.
Mitigation Recommendations
Immediate mitigation steps include implementing input validation and parameterized queries or prepared statements in the affected /admin/readenq.php script to sanitize the 'delid' parameter and prevent SQL injection. Organizations should conduct a thorough code review of the application to identify and remediate similar injection points. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block SQL injection attempts targeting this parameter. Restricting access to the /admin directory via IP whitelisting or VPN access can reduce exposure. Regular backups of the database should be maintained to enable recovery in case of data corruption. Monitoring and logging database queries and application logs for suspicious activity can aid in early detection. Since no official patch is currently available, organizations should engage with the vendor for updates or consider upgrading to a newer, secure version if available. Additionally, conducting penetration testing focused on injection vulnerabilities will help ensure comprehensive protection.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-13T19:41:22.557Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c6ef1f5673b0861add6118
Added to database: 9/14/2025, 4:36:47 PM
Last enriched: 9/14/2025, 4:37:11 PM
Last updated: 9/14/2025, 6:50:43 PM
Views: 3
Related Threats
CVE-2025-10408: SQL Injection in SourceCodester Student Grading System
MediumCVE-2025-10407: SQL Injection in SourceCodester Student Grading System
MediumCVE-2025-10405: SQL Injection in itsourcecode Baptism Information Management System
MediumCVE-2025-10404: SQL Injection in itsourcecode Baptism Information Management System
MediumCVE-2025-6051: CWE-1333 Inefficient Regular Expression Complexity in huggingface huggingface/transformers
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.