Skip to main content

CVE-2025-57149: n/a

Medium
VulnerabilityCVE-2025-57149cvecve-2025-57149
Published: Wed Sep 03 2025 (09/03/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

phpgurukul Complaint Management System 2.0 is vulnerable to SQL Injection in /complaint-details.php via the cid parameter.

AI-Powered Analysis

AILast updated: 09/03/2025, 15:33:40 UTC

Technical Analysis

CVE-2025-57149 identifies a SQL Injection vulnerability in the phpGurukul Complaint Management System version 2.0, specifically within the /complaint-details.php script via the 'cid' parameter. SQL Injection (CWE-89) vulnerabilities occur when user-supplied input is improperly sanitized and directly included in SQL queries, allowing an attacker to manipulate the database query structure. In this case, the 'cid' parameter, likely representing a complaint identifier, can be exploited by an attacker to inject malicious SQL code. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) reveals that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), requires privileges (PR:L) but no user interaction (UI:N), and impacts confidentiality (C:H) without affecting integrity (I:N) or availability (A:N). This suggests that an authenticated user with low privileges can exploit the vulnerability to extract sensitive data from the database, potentially compromising confidentiality without altering or disrupting the system. No known exploits are reported in the wild yet, and no patches have been linked, indicating that mitigation may require custom code review and remediation. The vulnerability was published on September 3, 2025, and reserved on August 17, 2025.

Potential Impact

For European organizations using phpGurukul Complaint Management System 2.0, this vulnerability poses a significant risk to the confidentiality of sensitive complaint data. Complaint management systems often store personally identifiable information (PII), customer grievances, and potentially sensitive operational data. Exploitation could lead to unauthorized disclosure of such data, violating GDPR and other data protection regulations prevalent in Europe, resulting in legal penalties and reputational damage. Since the vulnerability requires low privileges but authenticated access, insider threats or compromised user accounts could be leveraged to exploit this flaw. The lack of impact on integrity and availability reduces the risk of data tampering or service disruption but does not diminish the severity of data leakage. Organizations in sectors handling sensitive customer data, such as public services, healthcare, and consumer rights bodies, are particularly at risk. Additionally, the absence of known exploits suggests a window of opportunity for proactive remediation before widespread attacks occur.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit the /complaint-details.php script and specifically the handling of the 'cid' parameter. Implement parameterized queries or prepared statements to ensure that user input is safely handled and cannot alter SQL query structure. If using legacy code, refactor vulnerable database calls to use modern database access libraries that support parameterization. Conduct thorough input validation and sanitization on all user-supplied data, especially identifiers used in SQL queries. Restrict access to the complaint management system to only necessary users and enforce strong authentication and authorization controls to limit the risk of exploitation by low-privilege users. Monitor logs for unusual database query patterns or access attempts targeting the 'cid' parameter. Since no official patches are available, consider engaging with phpGurukul or the community for updates or applying custom fixes. Finally, perform regular security assessments and penetration testing focused on injection flaws to detect and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b85515ad5a09ad00f71e15

Added to database: 9/3/2025, 2:47:49 PM

Last enriched: 9/3/2025, 3:33:40 PM

Last updated: 9/4/2025, 1:34:54 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats