CVE-2025-65125: n/a
SQL injection in gosaliajainam/online-movie-booking 5.5 in movie_details.php allows attackers to gain sensitive information.
AI Analysis
Technical Summary
CVE-2025-65125 identifies a critical SQL injection vulnerability in the gosaliajainam/online-movie-booking application, version 5.5, specifically within the movie_details.php file. SQL injection (CWE-89) occurs when untrusted input is improperly sanitized, allowing attackers to inject malicious SQL queries that the backend database executes. This vulnerability enables remote, unauthenticated attackers to manipulate database queries, potentially extracting sensitive information such as user data, payment details, or administrative credentials. The CVSS 3.1 base score of 9.8 reflects the vulnerability's high impact and ease of exploitation: it requires no privileges or user interaction and can be exploited over the network. Although no public exploits are currently documented, the vulnerability's presence in a publicly available online movie booking system increases the risk of future exploitation. The lack of patch links suggests that no official fix has been released yet, underscoring the urgency for affected parties to implement interim mitigations. The vulnerability's exploitation could lead to full compromise of the database's confidentiality, integrity, and availability, enabling attackers to alter or delete records, disrupt service, or escalate further attacks within the network.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those operating or relying on online movie booking platforms or similar web applications that may share codebases or components with the affected software. Successful exploitation could lead to large-scale data breaches involving personally identifiable information (PII), payment card information, and business-critical data, resulting in regulatory penalties under GDPR and reputational damage. The disruption of booking services could impact revenue streams and customer trust. Additionally, attackers could leverage database access to pivot into internal networks, increasing the scope of compromise. The critical severity and network-based exploitation vector mean that even organizations with limited security controls could be targeted remotely. The absence of known exploits currently provides a narrow window for proactive defense, but the public disclosure increases the likelihood of exploit development and subsequent attacks.
Mitigation Recommendations
Immediate mitigation should focus on code-level remediation by replacing vulnerable SQL query constructions with parameterized queries or prepared statements to prevent injection. Input validation and sanitization must be enforced rigorously on all user-supplied data, particularly in movie_details.php and related modules. Organizations should conduct thorough code audits and penetration testing to identify similar vulnerabilities in their applications. Deploying Web Application Firewalls (WAFs) with rules targeting SQL injection patterns can provide temporary protection. Monitoring database logs and network traffic for anomalous queries or access patterns is critical to detect exploitation attempts. If patching is not yet available, isolating the affected application from sensitive backend systems and restricting database permissions can reduce impact. Regular backups and incident response plans should be updated to prepare for potential data loss or compromise. Finally, organizations should track updates from the software maintainers and apply official patches promptly once released.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2025-65125: n/a
Description
SQL injection in gosaliajainam/online-movie-booking 5.5 in movie_details.php allows attackers to gain sensitive information.
AI-Powered Analysis
Technical Analysis
CVE-2025-65125 identifies a critical SQL injection vulnerability in the gosaliajainam/online-movie-booking application, version 5.5, specifically within the movie_details.php file. SQL injection (CWE-89) occurs when untrusted input is improperly sanitized, allowing attackers to inject malicious SQL queries that the backend database executes. This vulnerability enables remote, unauthenticated attackers to manipulate database queries, potentially extracting sensitive information such as user data, payment details, or administrative credentials. The CVSS 3.1 base score of 9.8 reflects the vulnerability's high impact and ease of exploitation: it requires no privileges or user interaction and can be exploited over the network. Although no public exploits are currently documented, the vulnerability's presence in a publicly available online movie booking system increases the risk of future exploitation. The lack of patch links suggests that no official fix has been released yet, underscoring the urgency for affected parties to implement interim mitigations. The vulnerability's exploitation could lead to full compromise of the database's confidentiality, integrity, and availability, enabling attackers to alter or delete records, disrupt service, or escalate further attacks within the network.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those operating or relying on online movie booking platforms or similar web applications that may share codebases or components with the affected software. Successful exploitation could lead to large-scale data breaches involving personally identifiable information (PII), payment card information, and business-critical data, resulting in regulatory penalties under GDPR and reputational damage. The disruption of booking services could impact revenue streams and customer trust. Additionally, attackers could leverage database access to pivot into internal networks, increasing the scope of compromise. The critical severity and network-based exploitation vector mean that even organizations with limited security controls could be targeted remotely. The absence of known exploits currently provides a narrow window for proactive defense, but the public disclosure increases the likelihood of exploit development and subsequent attacks.
Mitigation Recommendations
Immediate mitigation should focus on code-level remediation by replacing vulnerable SQL query constructions with parameterized queries or prepared statements to prevent injection. Input validation and sanitization must be enforced rigorously on all user-supplied data, particularly in movie_details.php and related modules. Organizations should conduct thorough code audits and penetration testing to identify similar vulnerabilities in their applications. Deploying Web Application Firewalls (WAFs) with rules targeting SQL injection patterns can provide temporary protection. Monitoring database logs and network traffic for anomalous queries or access patterns is critical to detect exploitation attempts. If patching is not yet available, isolating the affected application from sensitive backend systems and restricting database permissions can reduce impact. Regular backups and incident response plans should be updated to prepare for potential data loss or compromise. Finally, organizations should track updates from the software maintainers and apply official patches promptly once released.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695843a1db813ff03e04a572
Added to database: 1/2/2026, 10:16:01 PM
Last enriched: 1/10/2026, 12:09:09 AM
Last updated: 2/7/2026, 7:57:11 AM
Views: 80
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2077: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.