Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15142: SQL Injection in 9786 phpok3w

0
Medium
VulnerabilityCVE-2025-15142cvecve-2025-15142
Published: Sun Dec 28 2025 (12/28/2025, 15:32:12 UTC)
Source: CVE Database V5
Vendor/Project: 9786
Product: phpok3w

Description

A vulnerability was identified in 9786 phpok3w up to 901d96a06809fb28b17f3a4362c59e70411c933c. Impacted is an unknown function of the file show.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:37:52 UTC

Technical Analysis

CVE-2025-15142 is a SQL injection vulnerability identified in the 9786 phpok3w web application, specifically within the show.php script. The vulnerability arises from improper sanitization of the ID parameter, allowing an attacker to inject malicious SQL queries remotely without requiring authentication or user interaction. This flaw can lead to unauthorized data disclosure, modification, or deletion, compromising the confidentiality, integrity, and availability of the backend database. The product uses a rolling release model, and the affected version is identified by a specific commit hash (901d96a06809fb28b17f3a4362c59e70411c933c), with no official patch or updated release available at the time of disclosure. Although no active exploitation in the wild has been reported, public exploit code exists, increasing the likelihood of attacks. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity due to its network attack vector, lack of required privileges or user interaction, and partial impact on data confidentiality, integrity, and availability. The vendor has been notified but has not yet responded or provided a fix. This vulnerability poses a significant risk to any organization using phpok3w, especially those hosting sensitive data or critical services.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized access to sensitive data, including personal, financial, or operational information stored in databases managed by phpok3w. Attackers exploiting this flaw could manipulate or delete data, disrupt services, or use the compromised system as a foothold for further attacks within the network. This is particularly concerning for sectors such as finance, healthcare, government, and e-commerce, where data integrity and confidentiality are paramount. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, potentially leading to regulatory non-compliance under GDPR due to data breaches. Additionally, service disruptions could impact business continuity and reputation. The lack of an official patch necessitates immediate mitigation efforts to reduce exposure.

Mitigation Recommendations

1. Implement immediate input validation and sanitization for the ID parameter in show.php, ensuring all inputs are strictly validated against expected formats and lengths. 2. Refactor the vulnerable code to use parameterized queries or prepared statements to prevent SQL injection. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the ID parameter. 4. Monitor web server and database logs for suspicious activities indicative of SQL injection attempts. 5. Restrict database user privileges to the minimum necessary to limit the impact of a successful injection. 6. If possible, isolate the phpok3w application environment to reduce lateral movement risks. 7. Engage with the vendor or community to track patch releases or official fixes and apply them promptly once available. 8. Conduct security audits and penetration testing focusing on injection vulnerabilities in the application. 9. Educate development teams on secure coding practices to prevent similar vulnerabilities in future rolling releases.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-27T10:20:50.984Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b9db813ff03e2bf702

Added to database: 12/30/2025, 10:22:49 PM

Last enriched: 12/30/2025, 11:37:52 PM

Last updated: 2/4/2026, 3:14:37 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats