Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65125: n/a

0
Critical
VulnerabilityCVE-2025-65125cvecve-2025-65125
Published: Fri Jan 02 2026 (01/02/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

SQL injection in gosaliajainam/online-movie-booking 5.5 in movie_details.php allows attackers to gain sensitive information.

AI-Powered Analysis

AILast updated: 01/10/2026, 00:09:09 UTC

Technical Analysis

CVE-2025-65125 identifies a critical SQL injection vulnerability in the gosaliajainam/online-movie-booking application, version 5.5, specifically within the movie_details.php file. SQL injection (CWE-89) occurs when untrusted input is improperly sanitized, allowing attackers to inject malicious SQL queries that the backend database executes. This vulnerability enables remote, unauthenticated attackers to manipulate database queries, potentially extracting sensitive information such as user data, payment details, or administrative credentials. The CVSS 3.1 base score of 9.8 reflects the vulnerability's high impact and ease of exploitation: it requires no privileges or user interaction and can be exploited over the network. Although no public exploits are currently documented, the vulnerability's presence in a publicly available online movie booking system increases the risk of future exploitation. The lack of patch links suggests that no official fix has been released yet, underscoring the urgency for affected parties to implement interim mitigations. The vulnerability's exploitation could lead to full compromise of the database's confidentiality, integrity, and availability, enabling attackers to alter or delete records, disrupt service, or escalate further attacks within the network.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those operating or relying on online movie booking platforms or similar web applications that may share codebases or components with the affected software. Successful exploitation could lead to large-scale data breaches involving personally identifiable information (PII), payment card information, and business-critical data, resulting in regulatory penalties under GDPR and reputational damage. The disruption of booking services could impact revenue streams and customer trust. Additionally, attackers could leverage database access to pivot into internal networks, increasing the scope of compromise. The critical severity and network-based exploitation vector mean that even organizations with limited security controls could be targeted remotely. The absence of known exploits currently provides a narrow window for proactive defense, but the public disclosure increases the likelihood of exploit development and subsequent attacks.

Mitigation Recommendations

Immediate mitigation should focus on code-level remediation by replacing vulnerable SQL query constructions with parameterized queries or prepared statements to prevent injection. Input validation and sanitization must be enforced rigorously on all user-supplied data, particularly in movie_details.php and related modules. Organizations should conduct thorough code audits and penetration testing to identify similar vulnerabilities in their applications. Deploying Web Application Firewalls (WAFs) with rules targeting SQL injection patterns can provide temporary protection. Monitoring database logs and network traffic for anomalous queries or access patterns is critical to detect exploitation attempts. If patching is not yet available, isolating the affected application from sensitive backend systems and restricting database permissions can reduce impact. Regular backups and incident response plans should be updated to prepare for potential data loss or compromise. Finally, organizations should track updates from the software maintainers and apply official patches promptly once released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695843a1db813ff03e04a572

Added to database: 1/2/2026, 10:16:01 PM

Last enriched: 1/10/2026, 12:09:09 AM

Last updated: 2/7/2026, 7:57:11 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats