CVE-2025-14192: SQL Injection in RashminDungrani online-banking
A vulnerability was found in RashminDungrani online-banking up to 2337ad552ea9d385b4e07b90e6f32d011b7c68a2. This affects an unknown part of the file /site/dist/auth_login.php. Performing manipulation of the argument Username results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14192 identifies a SQL injection vulnerability in the RashminDungrani online-banking system, affecting versions up to commit 2337ad552ea9d385b4e07b90e6f32d011b7c68a2. The vulnerability resides in the authentication login script (/site/dist/auth_login.php), where the Username parameter is improperly sanitized, allowing attackers to inject malicious SQL queries remotely. This flaw does not require any authentication or user interaction, making it highly accessible for exploitation. The continuous delivery model with rolling releases complicates pinpointing affected versions or patches, and the vendor has not provided any response or remediation guidance. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and partial impacts on confidentiality, integrity, and availability. Exploitation could lead to unauthorized data access, manipulation, or deletion within the banking platform's database, potentially compromising sensitive customer information and transactional integrity. Although no exploits are currently reported in the wild, public disclosure increases the risk of imminent attacks. The lack of vendor response and patch availability necessitates proactive defensive measures by users of this platform.
Potential Impact
European organizations using RashminDungrani online-banking software face significant risks including unauthorized access to sensitive customer data, financial information leakage, and potential manipulation or disruption of banking transactions. Confidentiality is at risk due to possible data exfiltration via SQL injection. Integrity could be compromised by unauthorized modification or deletion of records, affecting trustworthiness of financial data. Availability may be impacted if attackers exploit the vulnerability to cause denial of service or database corruption. Given the critical nature of banking services, such disruptions could lead to financial losses, regulatory penalties under GDPR, and reputational damage. The remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation, especially as exploit code is publicly available. European financial institutions must consider this vulnerability a serious threat to their operational security and customer trust.
Mitigation Recommendations
1. Immediate code audit and remediation: Review the /site/dist/auth_login.php script to implement proper input validation and parameterized queries or prepared statements to prevent SQL injection. 2. Deploy Web Application Firewalls (WAFs) with rules specifically targeting SQL injection patterns on the Username parameter. 3. Monitor logs for unusual database query patterns or repeated failed login attempts that may indicate exploitation attempts. 4. Since vendor patches are unavailable, consider isolating or restricting access to the affected service until a fix is released. 5. Conduct penetration testing and vulnerability scanning focused on injection flaws to identify any other vulnerable inputs. 6. Educate development teams on secure coding practices to prevent similar vulnerabilities in future rolling releases. 7. Engage with the vendor or community to push for timely patch releases and transparency. 8. Implement multi-factor authentication and additional layers of security to reduce impact if credentials are compromised.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-14192: SQL Injection in RashminDungrani online-banking
Description
A vulnerability was found in RashminDungrani online-banking up to 2337ad552ea9d385b4e07b90e6f32d011b7c68a2. This affects an unknown part of the file /site/dist/auth_login.php. Performing manipulation of the argument Username results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14192 identifies a SQL injection vulnerability in the RashminDungrani online-banking system, affecting versions up to commit 2337ad552ea9d385b4e07b90e6f32d011b7c68a2. The vulnerability resides in the authentication login script (/site/dist/auth_login.php), where the Username parameter is improperly sanitized, allowing attackers to inject malicious SQL queries remotely. This flaw does not require any authentication or user interaction, making it highly accessible for exploitation. The continuous delivery model with rolling releases complicates pinpointing affected versions or patches, and the vendor has not provided any response or remediation guidance. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and partial impacts on confidentiality, integrity, and availability. Exploitation could lead to unauthorized data access, manipulation, or deletion within the banking platform's database, potentially compromising sensitive customer information and transactional integrity. Although no exploits are currently reported in the wild, public disclosure increases the risk of imminent attacks. The lack of vendor response and patch availability necessitates proactive defensive measures by users of this platform.
Potential Impact
European organizations using RashminDungrani online-banking software face significant risks including unauthorized access to sensitive customer data, financial information leakage, and potential manipulation or disruption of banking transactions. Confidentiality is at risk due to possible data exfiltration via SQL injection. Integrity could be compromised by unauthorized modification or deletion of records, affecting trustworthiness of financial data. Availability may be impacted if attackers exploit the vulnerability to cause denial of service or database corruption. Given the critical nature of banking services, such disruptions could lead to financial losses, regulatory penalties under GDPR, and reputational damage. The remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation, especially as exploit code is publicly available. European financial institutions must consider this vulnerability a serious threat to their operational security and customer trust.
Mitigation Recommendations
1. Immediate code audit and remediation: Review the /site/dist/auth_login.php script to implement proper input validation and parameterized queries or prepared statements to prevent SQL injection. 2. Deploy Web Application Firewalls (WAFs) with rules specifically targeting SQL injection patterns on the Username parameter. 3. Monitor logs for unusual database query patterns or repeated failed login attempts that may indicate exploitation attempts. 4. Since vendor patches are unavailable, consider isolating or restricting access to the affected service until a fix is released. 5. Conduct penetration testing and vulnerability scanning focused on injection flaws to identify any other vulnerable inputs. 6. Educate development teams on secure coding practices to prevent similar vulnerabilities in future rolling releases. 7. Engage with the vendor or community to push for timely patch releases and transparency. 8. Implement multi-factor authentication and additional layers of security to reduce impact if credentials are compromised.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-06T17:15:34.899Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69358a9756f2fcb39f2bcb36
Added to database: 12/7/2025, 2:09:27 PM
Last enriched: 12/7/2025, 2:21:04 PM
Last updated: 12/8/2025, 2:22:36 AM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14209: SQL Injection in Campcodes School File Management System
MediumCVE-2025-14208: Command Injection in D-Link DIR-823X
MediumCVE-2025-14207: SQL Injection in tushar-2223 Hotel-Management-System
MediumCVE-2025-14206: Improper Authorization in SourceCodester Online Student Clearance System
MediumCVE-2025-14205: Cross Site Scripting in code-projects Chamber of Commerce Membership Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.