CVE-2025-14192: SQL Injection in RashminDungrani online-banking
A vulnerability was found in RashminDungrani online-banking up to 2337ad552ea9d385b4e07b90e6f32d011b7c68a2. This affects an unknown part of the file /site/dist/auth_login.php. Performing manipulation of the argument Username results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14192 identifies a SQL injection vulnerability in the RashminDungrani online-banking platform, specifically within the /site/dist/auth_login.php file. The flaw arises from improper sanitization of the Username parameter, allowing attackers to inject malicious SQL queries remotely without requiring authentication or user interaction. This vulnerability can lead to unauthorized access to sensitive banking data, manipulation of authentication processes, and potential compromise of backend databases. The continuous delivery model with rolling releases complicates tracking affected versions and patch deployment, as no fixed version numbers or updates have been disclosed. The vendor has not responded to early notifications, leaving organizations reliant on their own mitigations. The CVSS 4.0 score of 6.9 indicates a medium severity with network attack vector, low attack complexity, and no privileges or user interaction needed. The vulnerability impacts confidentiality, integrity, and availability to a limited extent but remains significant due to the critical nature of banking systems. Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of attacks. Organizations using this platform should prioritize detection and containment strategies while pressuring the vendor for timely patches.
Potential Impact
For European organizations, especially financial institutions using the RashminDungrani online-banking platform, this vulnerability poses a significant risk of data breaches involving customer credentials and financial information. Exploitation could enable attackers to bypass authentication, execute arbitrary SQL commands, and manipulate or exfiltrate sensitive data, leading to financial fraud, reputational damage, and regulatory penalties under GDPR. The availability of the banking service could also be disrupted, impacting customer trust and operational continuity. Given the criticality of banking infrastructure in Europe, exploitation could have cascading effects on financial markets and consumer confidence. The lack of vendor response and patch availability increases the window of exposure, necessitating proactive defensive measures. Additionally, attackers could leverage this vulnerability as a foothold for further lateral movement within affected organizations, amplifying the impact.
Mitigation Recommendations
1. Implement immediate input validation and sanitization on the Username parameter at the web application firewall (WAF) or reverse proxy level to block SQL injection payloads. 2. Deploy runtime application self-protection (RASP) tools to detect and prevent injection attempts in real time. 3. Conduct thorough code reviews and penetration testing focusing on authentication modules to identify and remediate injection flaws. 4. Isolate the affected authentication service from critical backend databases using network segmentation and strict access controls. 5. Monitor logs for anomalous SQL queries or failed login attempts indicative of exploitation attempts. 6. Engage with the vendor persistently to obtain patches or updates; if unavailable, consider migrating to alternative platforms with robust security. 7. Educate security teams on this specific vulnerability and update incident response plans to include SQL injection attack scenarios. 8. Apply database-level protections such as least privilege accounts and query parameterization where possible. 9. Use multi-factor authentication to reduce the impact of compromised credentials. 10. Regularly update and patch all related infrastructure components to reduce attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Switzerland, Luxembourg, Belgium, Italy, Spain
CVE-2025-14192: SQL Injection in RashminDungrani online-banking
Description
A vulnerability was found in RashminDungrani online-banking up to 2337ad552ea9d385b4e07b90e6f32d011b7c68a2. This affects an unknown part of the file /site/dist/auth_login.php. Performing manipulation of the argument Username results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14192 identifies a SQL injection vulnerability in the RashminDungrani online-banking platform, specifically within the /site/dist/auth_login.php file. The flaw arises from improper sanitization of the Username parameter, allowing attackers to inject malicious SQL queries remotely without requiring authentication or user interaction. This vulnerability can lead to unauthorized access to sensitive banking data, manipulation of authentication processes, and potential compromise of backend databases. The continuous delivery model with rolling releases complicates tracking affected versions and patch deployment, as no fixed version numbers or updates have been disclosed. The vendor has not responded to early notifications, leaving organizations reliant on their own mitigations. The CVSS 4.0 score of 6.9 indicates a medium severity with network attack vector, low attack complexity, and no privileges or user interaction needed. The vulnerability impacts confidentiality, integrity, and availability to a limited extent but remains significant due to the critical nature of banking systems. Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of attacks. Organizations using this platform should prioritize detection and containment strategies while pressuring the vendor for timely patches.
Potential Impact
For European organizations, especially financial institutions using the RashminDungrani online-banking platform, this vulnerability poses a significant risk of data breaches involving customer credentials and financial information. Exploitation could enable attackers to bypass authentication, execute arbitrary SQL commands, and manipulate or exfiltrate sensitive data, leading to financial fraud, reputational damage, and regulatory penalties under GDPR. The availability of the banking service could also be disrupted, impacting customer trust and operational continuity. Given the criticality of banking infrastructure in Europe, exploitation could have cascading effects on financial markets and consumer confidence. The lack of vendor response and patch availability increases the window of exposure, necessitating proactive defensive measures. Additionally, attackers could leverage this vulnerability as a foothold for further lateral movement within affected organizations, amplifying the impact.
Mitigation Recommendations
1. Implement immediate input validation and sanitization on the Username parameter at the web application firewall (WAF) or reverse proxy level to block SQL injection payloads. 2. Deploy runtime application self-protection (RASP) tools to detect and prevent injection attempts in real time. 3. Conduct thorough code reviews and penetration testing focusing on authentication modules to identify and remediate injection flaws. 4. Isolate the affected authentication service from critical backend databases using network segmentation and strict access controls. 5. Monitor logs for anomalous SQL queries or failed login attempts indicative of exploitation attempts. 6. Engage with the vendor persistently to obtain patches or updates; if unavailable, consider migrating to alternative platforms with robust security. 7. Educate security teams on this specific vulnerability and update incident response plans to include SQL injection attack scenarios. 8. Apply database-level protections such as least privilege accounts and query parameterization where possible. 9. Use multi-factor authentication to reduce the impact of compromised credentials. 10. Regularly update and patch all related infrastructure components to reduce attack surface.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-06T17:15:34.899Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69358a9756f2fcb39f2bcb36
Added to database: 12/7/2025, 2:09:27 PM
Last enriched: 12/14/2025, 2:42:35 PM
Last updated: 2/5/2026, 12:58:16 AM
Views: 91
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1896: Improper Access Controls in WeKan
MediumCVE-2025-13192: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
HighCVE-2026-1895: Improper Access Controls in WeKan
MediumCVE-2025-22873: CWE-23: Relative Path Traversal in Go standard library os
MediumCVE-2026-22038: CWE-532: Insertion of Sensitive Information into Log File in Significant-Gravitas AutoGPT
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.