CVE-2025-10967: SQL Injection in MuFen-mker PHP-Usermm
A vulnerability was detected in MuFen-mker PHP-Usermm up to 37f2d24e51b04346dfc565b93fc2fc6b37bdaea9. This affects an unknown part of the file /chkuser.php. Performing manipulation of the argument Username results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10967 is a SQL Injection vulnerability identified in the MuFen-mker PHP-Usermm product, specifically affecting the /chkuser.php file. The vulnerability arises from improper sanitization or validation of the 'Username' parameter, allowing an attacker to manipulate this input to inject malicious SQL code. This flaw can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The product follows a rolling release model, which complicates pinpointing exact affected versions, but the vulnerability is confirmed up to the commit hash 37f2d24e51b04346dfc565b93fc2fc6b37bdaea9. The vendor has not responded to early disclosure attempts, and no patches or fixes have been publicly released. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the vulnerability's network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public availability of the exploit code increases the risk of exploitation. SQL Injection vulnerabilities can lead to unauthorized data access, data modification, or even full system compromise depending on the backend database and application logic. Given the lack of vendor response and patch availability, organizations using PHP-Usermm should consider this a significant risk.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, particularly for those relying on MuFen-mker PHP-Usermm for user management or authentication services. Exploitation could lead to unauthorized access to sensitive user data, including personally identifiable information (PII), which is subject to strict regulatory protections under GDPR. Data breaches resulting from this vulnerability could lead to regulatory fines, reputational damage, and operational disruptions. Additionally, attackers could leverage the SQL Injection to escalate privileges or pivot within the network, potentially compromising other critical systems. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target organizations without needing insider access. The continuous rolling release model without clear patching guidance further complicates timely remediation, increasing exposure time. Organizations in sectors such as finance, healthcare, government, and critical infrastructure in Europe, where data protection and service availability are paramount, face heightened risks.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL Injection patterns targeting the 'Username' parameter in /chkuser.php. Conduct thorough input validation and sanitization on all user-supplied data, ideally using parameterized queries or prepared statements if source code access is available. Organizations should perform code audits and penetration testing focused on this endpoint to identify and remediate injection points. Network segmentation and strict access controls can limit lateral movement if exploitation occurs. Monitoring and logging of database queries and web application logs should be enhanced to detect anomalous activities indicative of exploitation attempts. If feasible, consider temporarily disabling or restricting access to the vulnerable functionality until a vendor patch or official fix is released. Engage with the vendor persistently for updates and subscribe to vulnerability intelligence feeds to stay informed. Finally, ensure that incident response plans are updated to handle potential exploitation scenarios related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10967: SQL Injection in MuFen-mker PHP-Usermm
Description
A vulnerability was detected in MuFen-mker PHP-Usermm up to 37f2d24e51b04346dfc565b93fc2fc6b37bdaea9. This affects an unknown part of the file /chkuser.php. Performing manipulation of the argument Username results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10967 is a SQL Injection vulnerability identified in the MuFen-mker PHP-Usermm product, specifically affecting the /chkuser.php file. The vulnerability arises from improper sanitization or validation of the 'Username' parameter, allowing an attacker to manipulate this input to inject malicious SQL code. This flaw can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The product follows a rolling release model, which complicates pinpointing exact affected versions, but the vulnerability is confirmed up to the commit hash 37f2d24e51b04346dfc565b93fc2fc6b37bdaea9. The vendor has not responded to early disclosure attempts, and no patches or fixes have been publicly released. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the vulnerability's network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public availability of the exploit code increases the risk of exploitation. SQL Injection vulnerabilities can lead to unauthorized data access, data modification, or even full system compromise depending on the backend database and application logic. Given the lack of vendor response and patch availability, organizations using PHP-Usermm should consider this a significant risk.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, particularly for those relying on MuFen-mker PHP-Usermm for user management or authentication services. Exploitation could lead to unauthorized access to sensitive user data, including personally identifiable information (PII), which is subject to strict regulatory protections under GDPR. Data breaches resulting from this vulnerability could lead to regulatory fines, reputational damage, and operational disruptions. Additionally, attackers could leverage the SQL Injection to escalate privileges or pivot within the network, potentially compromising other critical systems. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target organizations without needing insider access. The continuous rolling release model without clear patching guidance further complicates timely remediation, increasing exposure time. Organizations in sectors such as finance, healthcare, government, and critical infrastructure in Europe, where data protection and service availability are paramount, face heightened risks.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL Injection patterns targeting the 'Username' parameter in /chkuser.php. Conduct thorough input validation and sanitization on all user-supplied data, ideally using parameterized queries or prepared statements if source code access is available. Organizations should perform code audits and penetration testing focused on this endpoint to identify and remediate injection points. Network segmentation and strict access controls can limit lateral movement if exploitation occurs. Monitoring and logging of database queries and web application logs should be enhanced to detect anomalous activities indicative of exploitation attempts. If feasible, consider temporarily disabling or restricting access to the vulnerable functionality until a vendor patch or official fix is released. Engage with the vendor persistently for updates and subscribe to vulnerability intelligence feeds to stay informed. Finally, ensure that incident response plans are updated to handle potential exploitation scenarios related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-25T10:15:56.881Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d5da079e21be37e937d052
Added to database: 9/26/2025, 12:10:47 AM
Last enriched: 9/26/2025, 12:12:24 AM
Last updated: 9/26/2025, 12:12:24 AM
Views: 2
Related Threats
CVE-2025-10993: Code Injection in MuYuCMS
MediumCVE-2025-10992: Improper Authorization in roncoo roncoo-pay
MediumCVE-2025-60251: CWE-306 Missing Authentication for Critical Function in Unitree Go2
MediumCVE-2025-60250: CWE-321 Use of Hard-coded Cryptographic Key in Unitree Go2
MediumCVE-2025-60017: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Unitree Go2
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.