CVE-2025-4761: SQL Injection in PHPGurukul Complaint Management System
A vulnerability has been found in PHPGurukul Complaint Management System 2.0 and classified as critical. This vulnerability affects unknown code of the file /admin/admin-profile.php. The manipulation of the argument mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-4761 is a SQL Injection vulnerability identified in version 2.0 of the PHPGurukul Complaint Management System, specifically within the /admin/admin-profile.php file. The vulnerability arises due to improper sanitization or validation of the 'mobilenumber' parameter, which can be manipulated by an attacker to inject malicious SQL code. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database without requiring any user interaction or privileges. The vulnerability is classified as medium severity with a CVSS 4.0 base score of 6.9, reflecting its network attack vector, low complexity, and no required privileges or user interaction. Exploiting this vulnerability could lead to unauthorized data access, data modification, or potentially database corruption, depending on the database permissions and structure. Although no public exploit is currently known to be actively used in the wild, the disclosure of the vulnerability increases the risk of exploitation by attackers. The lack of available patches or mitigations from the vendor at this time further exacerbates the risk for organizations using this software version. Given the critical role complaint management systems play in handling sensitive user and organizational data, this vulnerability poses a significant risk to confidentiality and integrity of data stored within affected systems.
Potential Impact
For European organizations using PHPGurukul Complaint Management System 2.0, this vulnerability could result in unauthorized disclosure of sensitive complaint data, including personal information of customers or employees, which would violate GDPR and other data protection regulations. The integrity of complaint records could be compromised, undermining trust in organizational processes and potentially leading to legal and reputational damage. Additionally, attackers could leverage the SQL injection to escalate their access within the network or pivot to other systems, increasing the scope of impact. The availability impact is likely limited but cannot be ruled out if attackers execute destructive SQL commands. Given the remote and unauthenticated nature of the exploit, organizations face a heightened risk of automated or targeted attacks, especially if the system is internet-facing or accessible from less secure network segments.
Mitigation Recommendations
Organizations should immediately audit their use of PHPGurukul Complaint Management System 2.0 and isolate affected instances from public internet access where possible. As no official patch is currently available, implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'mobilenumber' parameter in /admin/admin-profile.php. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries. Employ parameterized queries or prepared statements if modifying the source code is feasible. Monitor logs for suspicious database query patterns or repeated failed attempts to exploit this parameter. Restrict database user permissions to the minimum necessary to limit the impact of any successful injection. Finally, engage with the vendor or community to track patch releases and plan for prompt application once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-4761: SQL Injection in PHPGurukul Complaint Management System
Description
A vulnerability has been found in PHPGurukul Complaint Management System 2.0 and classified as critical. This vulnerability affects unknown code of the file /admin/admin-profile.php. The manipulation of the argument mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-4761 is a SQL Injection vulnerability identified in version 2.0 of the PHPGurukul Complaint Management System, specifically within the /admin/admin-profile.php file. The vulnerability arises due to improper sanitization or validation of the 'mobilenumber' parameter, which can be manipulated by an attacker to inject malicious SQL code. This flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database without requiring any user interaction or privileges. The vulnerability is classified as medium severity with a CVSS 4.0 base score of 6.9, reflecting its network attack vector, low complexity, and no required privileges or user interaction. Exploiting this vulnerability could lead to unauthorized data access, data modification, or potentially database corruption, depending on the database permissions and structure. Although no public exploit is currently known to be actively used in the wild, the disclosure of the vulnerability increases the risk of exploitation by attackers. The lack of available patches or mitigations from the vendor at this time further exacerbates the risk for organizations using this software version. Given the critical role complaint management systems play in handling sensitive user and organizational data, this vulnerability poses a significant risk to confidentiality and integrity of data stored within affected systems.
Potential Impact
For European organizations using PHPGurukul Complaint Management System 2.0, this vulnerability could result in unauthorized disclosure of sensitive complaint data, including personal information of customers or employees, which would violate GDPR and other data protection regulations. The integrity of complaint records could be compromised, undermining trust in organizational processes and potentially leading to legal and reputational damage. Additionally, attackers could leverage the SQL injection to escalate their access within the network or pivot to other systems, increasing the scope of impact. The availability impact is likely limited but cannot be ruled out if attackers execute destructive SQL commands. Given the remote and unauthenticated nature of the exploit, organizations face a heightened risk of automated or targeted attacks, especially if the system is internet-facing or accessible from less secure network segments.
Mitigation Recommendations
Organizations should immediately audit their use of PHPGurukul Complaint Management System 2.0 and isolate affected instances from public internet access where possible. As no official patch is currently available, implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'mobilenumber' parameter in /admin/admin-profile.php. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries. Employ parameterized queries or prepared statements if modifying the source code is feasible. Monitor logs for suspicious database query patterns or repeated failed attempts to exploit this parameter. Restrict database user permissions to the minimum necessary to limit the impact of any successful injection. Finally, engage with the vendor or community to track patch releases and plan for prompt application once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-15T11:40:57.410Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebdd8
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 11:31:39 PM
Last updated: 8/12/2025, 4:41:23 AM
Views: 9
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.