Skip to main content

CVE-2025-10402: SQL Injection in PHPGurukul Beauty Parlour Management System

Medium
VulnerabilityCVE-2025-10402cvecve-2025-10402
Published: Sun Sep 14 2025 (09/14/2025, 16:32:07 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Beauty Parlour Management System

Description

A flaw has been found in PHPGurukul Beauty Parlour Management System 1.1. The impacted element is an unknown function of the file /admin/readenq.php. Executing manipulation of the argument delid can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 09/14/2025, 16:37:11 UTC

Technical Analysis

CVE-2025-10402 is a SQL Injection vulnerability identified in version 1.1 of the PHPGurukul Beauty Parlour Management System. The vulnerability resides in an unspecified function within the /admin/readenq.php file, specifically involving the manipulation of the 'delid' parameter. An attacker can remotely exploit this flaw by injecting malicious SQL code through the 'delid' argument without requiring any authentication or user interaction. The vulnerability allows an attacker to interfere with the application's database queries, potentially leading to unauthorized data access, data modification, or deletion. The CVSS 4.0 base score is 6.9 (medium severity), reflecting that the attack vector is network-based (remote), with low complexity and no privileges or user interaction needed. The impact on confidentiality, integrity, and availability is limited but present, as indicated by the partial impact ratings in the CVSS vector. No official patch or mitigation has been published yet, and while no known exploits are currently observed in the wild, the existence of a public exploit increases the risk of exploitation. The vulnerability is critical for organizations relying on this specific management system, especially those handling sensitive customer or business data within the beauty and wellness sector.

Potential Impact

For European organizations using PHPGurukul Beauty Parlour Management System 1.1, this vulnerability poses a significant risk of unauthorized database access and manipulation. Successful exploitation could lead to leakage of sensitive customer information, including personal data, appointment details, and payment information, potentially violating GDPR requirements. Data integrity could be compromised, affecting business operations and customer trust. Availability impacts could arise if attackers delete or corrupt database records, disrupting service continuity. Given the remote exploitability without authentication, attackers can target vulnerable systems over the internet, increasing the attack surface. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise but still represents a substantial threat to confidentiality and integrity. Organizations in Europe must consider the regulatory and reputational consequences of such data breaches, especially in countries with strict data protection enforcement.

Mitigation Recommendations

Immediate mitigation steps include implementing input validation and parameterized queries or prepared statements in the affected /admin/readenq.php script to sanitize the 'delid' parameter and prevent SQL injection. Organizations should conduct a thorough code review of the application to identify and remediate similar injection points. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block SQL injection attempts targeting this parameter. Restricting access to the /admin directory via IP whitelisting or VPN access can reduce exposure. Regular backups of the database should be maintained to enable recovery in case of data corruption. Monitoring and logging database queries and application logs for suspicious activity can aid in early detection. Since no official patch is currently available, organizations should engage with the vendor for updates or consider upgrading to a newer, secure version if available. Additionally, conducting penetration testing focused on injection vulnerabilities will help ensure comprehensive protection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T19:41:22.557Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c6ef1f5673b0861add6118

Added to database: 9/14/2025, 4:36:47 PM

Last enriched: 9/14/2025, 4:37:11 PM

Last updated: 9/14/2025, 6:50:43 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats