Skip to main content

CVE-2025-5612: SQL Injection in PHPGurukul Online Fire Reporting System

Medium
VulnerabilityCVE-2025-5612cvecve-2025-5612
Published: Wed Jun 04 2025 (06/04/2025, 21:00:18 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Online Fire Reporting System

Description

A vulnerability has been found in PHPGurukul Online Fire Reporting System 1.2 and classified as critical. This vulnerability affects unknown code of the file /reporting.php. The manipulation of the argument fullname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

AI-Powered Analysis

AILast updated: 07/07/2025, 02:58:53 UTC

Technical Analysis

CVE-2025-5612 is a SQL Injection vulnerability identified in version 1.2 of the PHPGurukul Online Fire Reporting System, specifically within the /reporting.php file. The vulnerability arises from improper sanitization or validation of the 'fullname' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data access, data modification, or deletion. The vulnerability is classified as medium severity with a CVSS 4.0 base score of 5.3, reflecting that it requires no user interaction and no privileges but does require some level of access (PR:L) and has limited impact on confidentiality, integrity, and availability. Although the exploit has been publicly disclosed, there are no known active exploits in the wild at this time. The vulnerability may also affect other parameters, indicating a broader input validation issue within the application. Given the nature of the application—an online fire reporting system—compromise could lead to manipulation or exposure of sensitive incident reports, undermining emergency response efforts and public safety data integrity.

Potential Impact

For European organizations, particularly those involved in emergency services, municipal fire departments, or government agencies using the PHPGurukul Online Fire Reporting System, this vulnerability poses a risk of unauthorized access to sensitive incident data. Exploitation could result in exposure of confidential information, alteration of fire incident reports, or disruption of reporting workflows. This could degrade trust in emergency response systems, delay critical response actions, and potentially endanger public safety. Additionally, data breaches involving personal information of reporters or victims could lead to GDPR violations, resulting in legal and financial penalties. The medium severity rating suggests that while the vulnerability is exploitable remotely without user interaction, the impact is somewhat limited, but still significant given the critical nature of the data handled by the system.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately review and update the input validation and sanitization mechanisms for all parameters in the /reporting.php file, especially the 'fullname' parameter. Implementing parameterized queries or prepared statements is essential to prevent SQL injection attacks. If a patch from the vendor becomes available, it should be applied promptly. In the absence of an official patch, organizations should consider deploying Web Application Firewalls (WAFs) with specific rules to detect and block SQL injection payloads targeting the affected endpoints. Regular code audits and penetration testing should be conducted to identify and remediate similar injection flaws. Additionally, monitoring database logs for suspicious queries and implementing strict access controls on the database can help detect and limit the impact of potential exploitation. Finally, organizations should ensure that backups of critical data are maintained securely to enable recovery in case of data tampering.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-04T10:59:40.496Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6840c579182aa0cae2c16b05

Added to database: 6/4/2025, 10:15:21 PM

Last enriched: 7/7/2025, 2:58:53 AM

Last updated: 8/15/2025, 2:50:23 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats