Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14192: SQL Injection in RashminDungrani online-banking

0
Medium
VulnerabilityCVE-2025-14192cvecve-2025-14192
Published: Sun Dec 07 2025 (12/07/2025, 13:32:06 UTC)
Source: CVE Database V5
Vendor/Project: RashminDungrani
Product: online-banking

Description

A vulnerability was found in RashminDungrani online-banking up to 2337ad552ea9d385b4e07b90e6f32d011b7c68a2. This affects an unknown part of the file /site/dist/auth_login.php. Performing manipulation of the argument Username results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/07/2025, 14:21:04 UTC

Technical Analysis

CVE-2025-14192 identifies a SQL injection vulnerability in the RashminDungrani online-banking system, affecting versions up to commit 2337ad552ea9d385b4e07b90e6f32d011b7c68a2. The vulnerability resides in the authentication login script (/site/dist/auth_login.php), where the Username parameter is improperly sanitized, allowing attackers to inject malicious SQL queries remotely. This flaw does not require any authentication or user interaction, making it highly accessible for exploitation. The continuous delivery model with rolling releases complicates pinpointing affected versions or patches, and the vendor has not provided any response or remediation guidance. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and partial impacts on confidentiality, integrity, and availability. Exploitation could lead to unauthorized data access, manipulation, or deletion within the banking platform's database, potentially compromising sensitive customer information and transactional integrity. Although no exploits are currently reported in the wild, public disclosure increases the risk of imminent attacks. The lack of vendor response and patch availability necessitates proactive defensive measures by users of this platform.

Potential Impact

European organizations using RashminDungrani online-banking software face significant risks including unauthorized access to sensitive customer data, financial information leakage, and potential manipulation or disruption of banking transactions. Confidentiality is at risk due to possible data exfiltration via SQL injection. Integrity could be compromised by unauthorized modification or deletion of records, affecting trustworthiness of financial data. Availability may be impacted if attackers exploit the vulnerability to cause denial of service or database corruption. Given the critical nature of banking services, such disruptions could lead to financial losses, regulatory penalties under GDPR, and reputational damage. The remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation, especially as exploit code is publicly available. European financial institutions must consider this vulnerability a serious threat to their operational security and customer trust.

Mitigation Recommendations

1. Immediate code audit and remediation: Review the /site/dist/auth_login.php script to implement proper input validation and parameterized queries or prepared statements to prevent SQL injection. 2. Deploy Web Application Firewalls (WAFs) with rules specifically targeting SQL injection patterns on the Username parameter. 3. Monitor logs for unusual database query patterns or repeated failed login attempts that may indicate exploitation attempts. 4. Since vendor patches are unavailable, consider isolating or restricting access to the affected service until a fix is released. 5. Conduct penetration testing and vulnerability scanning focused on injection flaws to identify any other vulnerable inputs. 6. Educate development teams on secure coding practices to prevent similar vulnerabilities in future rolling releases. 7. Engage with the vendor or community to push for timely patch releases and transparency. 8. Implement multi-factor authentication and additional layers of security to reduce impact if credentials are compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T17:15:34.899Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69358a9756f2fcb39f2bcb36

Added to database: 12/7/2025, 2:09:27 PM

Last enriched: 12/7/2025, 2:21:04 PM

Last updated: 12/8/2025, 2:22:36 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats