Skip to main content

CVE-2025-5575: SQL Injection in PHPGurukul Dairy Farm Shop Management System

Medium
VulnerabilityCVE-2025-5575cvecve-2025-5575
Published: Wed Jun 04 2025 (06/04/2025, 07:00:18 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Dairy Farm Shop Management System

Description

A vulnerability classified as critical was found in PHPGurukul Dairy Farm Shop Management System 1.3. This vulnerability affects unknown code of the file /add-product.php. The manipulation of the argument productname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/05/2025, 22:10:38 UTC

Technical Analysis

CVE-2025-5575 is a critical SQL Injection vulnerability identified in version 1.3 of the PHPGurukul Dairy Farm Shop Management System, specifically within the /add-product.php script. The vulnerability arises from improper sanitization or validation of the 'productname' parameter, allowing an attacker to inject malicious SQL code remotely without any authentication or user interaction. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or deletion. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits are currently reported in the wild. The CVSS 4.0 base score is 6.9, indicating a medium severity level, reflecting the ease of remote exploitation without privileges but limited impact on confidentiality, integrity, and availability due to partial control over the database. The vulnerability affects a niche product used for managing dairy farm shop operations, which may include inventory, sales, and customer data. Given the nature of SQL Injection, attackers could extract sensitive business data, alter product information, or disrupt shop operations, impacting business continuity and data trustworthiness.

Potential Impact

For European organizations using the PHPGurukul Dairy Farm Shop Management System, this vulnerability poses a significant risk to operational integrity and data security. Dairy farms and related agricultural businesses in Europe that rely on this software for inventory and sales management could face unauthorized data disclosure, leading to exposure of sensitive commercial information or customer data. Data manipulation could result in inaccurate inventory records, financial discrepancies, and disruption of sales processes, potentially causing financial losses and reputational damage. Additionally, if attackers leverage this vulnerability to execute further database commands, it could lead to denial of service or persistent backdoors within the system. The impact is particularly critical for small to medium enterprises in the agricultural sector that may lack robust cybersecurity defenses and incident response capabilities.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately review and sanitize all inputs to the /add-product.php endpoint, especially the 'productname' parameter, employing parameterized queries or prepared statements to prevent SQL Injection. Since no official patch is currently available, applying a Web Application Firewall (WAF) with specific SQL Injection detection rules can provide a temporary protective layer. Conduct thorough code audits to identify and remediate similar injection points throughout the application. Restrict database user privileges to the minimum necessary to limit the impact of potential exploitation. Regularly monitor logs for suspicious database query patterns or unusual access attempts. Organizations should also consider isolating the affected system within the network to reduce exposure and plan for an upgrade or migration to a patched or alternative solution once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-03T20:41:33.714Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683ff236182aa0cae2a183f3

Added to database: 6/4/2025, 7:13:58 AM

Last enriched: 7/5/2025, 10:10:38 PM

Last updated: 8/1/2025, 10:34:30 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats