Skip to main content

CVE-2025-5561: SQL Injection in PHPGurukul Curfew e-Pass Management System

Medium
VulnerabilityCVE-2025-5561cvecve-2025-5561
Published: Wed Jun 04 2025 (06/04/2025, 04:31:06 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Curfew e-Pass Management System

Description

A vulnerability was found in PHPGurukul Curfew e-Pass Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/view-pass-detail.php. The manipulation of the argument viewid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/05/2025, 14:10:03 UTC

Technical Analysis

CVE-2025-5561 is a SQL Injection vulnerability identified in version 1.0 of the PHPGurukul Curfew e-Pass Management System, specifically within the /admin/view-pass-detail.php file. The vulnerability arises from improper sanitization or validation of the 'viewid' parameter, which is used in SQL queries. An attacker can manipulate this parameter remotely without any authentication or user interaction, injecting malicious SQL code that could alter the intended database queries. This can lead to unauthorized data access, data modification, or even complete compromise of the underlying database. The vulnerability is classified with a CVSS 4.0 score of 6.9, indicating a medium severity level, with network attack vector, low complexity, and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is considered low individually but combined can lead to significant risks, especially if sensitive data is stored or if the system controls critical access permissions. No patches or fixes have been publicly disclosed yet, and while no known exploits are currently detected in the wild, the public disclosure of the exploit code increases the risk of exploitation. The Curfew e-Pass Management System is likely used by government or municipal authorities to manage movement permissions during curfews or lockdowns, making it a critical system for public safety and administration.

Potential Impact

For European organizations, particularly governmental or municipal bodies using the PHPGurukul Curfew e-Pass Management System or similar e-pass management platforms, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive personal data of citizens, manipulation of e-pass records, or disruption of curfew enforcement processes. This could undermine public trust, violate data protection regulations such as GDPR, and potentially facilitate unauthorized movement during restricted periods, impacting public safety. The integrity of the system could be compromised, allowing attackers to forge or alter e-pass details. Availability impact is less direct but could occur if attackers leverage SQL injection to cause denial of service or corrupt the database. Given the critical nature of curfew management systems during emergencies, any disruption or data breach could have serious societal and operational consequences.

Mitigation Recommendations

1. Immediate code review and sanitization: Developers should implement strict input validation and parameterized queries (prepared statements) for the 'viewid' parameter to prevent SQL injection. 2. Web Application Firewall (WAF): Deploy or update WAF rules to detect and block SQL injection attempts targeting the vulnerable endpoint. 3. Access controls: Restrict access to the /admin/view-pass-detail.php page to trusted IP ranges or authenticated users where possible, even if the system currently allows unauthenticated access. 4. Monitoring and logging: Enable detailed logging of all requests to the vulnerable endpoint and monitor for suspicious patterns indicative of SQL injection attempts. 5. Patch management: Engage with the vendor or community to obtain or develop patches addressing this vulnerability and apply them promptly. 6. Incident response readiness: Prepare to respond to potential exploitation attempts, including data breach notification procedures compliant with GDPR. 7. Alternative mitigations: If immediate patching is not possible, consider isolating the system from public internet access or placing it behind VPNs or secure gateways to limit exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-03T16:57:58.424Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683fcf0a182aa0cae29c261c

Added to database: 6/4/2025, 4:43:54 AM

Last enriched: 7/5/2025, 2:10:03 PM

Last updated: 8/17/2025, 2:11:47 PM

Views: 48

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats