Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14192: SQL Injection in RashminDungrani online-banking

0
Medium
VulnerabilityCVE-2025-14192cvecve-2025-14192
Published: Sun Dec 07 2025 (12/07/2025, 13:32:06 UTC)
Source: CVE Database V5
Vendor/Project: RashminDungrani
Product: online-banking

Description

A vulnerability was found in RashminDungrani online-banking up to 2337ad552ea9d385b4e07b90e6f32d011b7c68a2. This affects an unknown part of the file /site/dist/auth_login.php. Performing manipulation of the argument Username results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/14/2025, 14:42:35 UTC

Technical Analysis

CVE-2025-14192 identifies a SQL injection vulnerability in the RashminDungrani online-banking platform, specifically within the /site/dist/auth_login.php file. The flaw arises from improper sanitization of the Username parameter, allowing attackers to inject malicious SQL queries remotely without requiring authentication or user interaction. This vulnerability can lead to unauthorized access to sensitive banking data, manipulation of authentication processes, and potential compromise of backend databases. The continuous delivery model with rolling releases complicates tracking affected versions and patch deployment, as no fixed version numbers or updates have been disclosed. The vendor has not responded to early notifications, leaving organizations reliant on their own mitigations. The CVSS 4.0 score of 6.9 indicates a medium severity with network attack vector, low attack complexity, and no privileges or user interaction needed. The vulnerability impacts confidentiality, integrity, and availability to a limited extent but remains significant due to the critical nature of banking systems. Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of attacks. Organizations using this platform should prioritize detection and containment strategies while pressuring the vendor for timely patches.

Potential Impact

For European organizations, especially financial institutions using the RashminDungrani online-banking platform, this vulnerability poses a significant risk of data breaches involving customer credentials and financial information. Exploitation could enable attackers to bypass authentication, execute arbitrary SQL commands, and manipulate or exfiltrate sensitive data, leading to financial fraud, reputational damage, and regulatory penalties under GDPR. The availability of the banking service could also be disrupted, impacting customer trust and operational continuity. Given the criticality of banking infrastructure in Europe, exploitation could have cascading effects on financial markets and consumer confidence. The lack of vendor response and patch availability increases the window of exposure, necessitating proactive defensive measures. Additionally, attackers could leverage this vulnerability as a foothold for further lateral movement within affected organizations, amplifying the impact.

Mitigation Recommendations

1. Implement immediate input validation and sanitization on the Username parameter at the web application firewall (WAF) or reverse proxy level to block SQL injection payloads. 2. Deploy runtime application self-protection (RASP) tools to detect and prevent injection attempts in real time. 3. Conduct thorough code reviews and penetration testing focusing on authentication modules to identify and remediate injection flaws. 4. Isolate the affected authentication service from critical backend databases using network segmentation and strict access controls. 5. Monitor logs for anomalous SQL queries or failed login attempts indicative of exploitation attempts. 6. Engage with the vendor persistently to obtain patches or updates; if unavailable, consider migrating to alternative platforms with robust security. 7. Educate security teams on this specific vulnerability and update incident response plans to include SQL injection attack scenarios. 8. Apply database-level protections such as least privilege accounts and query parameterization where possible. 9. Use multi-factor authentication to reduce the impact of compromised credentials. 10. Regularly update and patch all related infrastructure components to reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T17:15:34.899Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69358a9756f2fcb39f2bcb36

Added to database: 12/7/2025, 2:09:27 PM

Last enriched: 12/14/2025, 2:42:35 PM

Last updated: 2/5/2026, 12:58:16 AM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats