Skip to main content

CVE-2025-7161: SQL Injection in PHPGurukul Zoo Management System

Medium
VulnerabilityCVE-2025-7161cvecve-2025-7161
Published: Tue Jul 08 2025 (07/08/2025, 04:02:06 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Zoo Management System

Description

A vulnerability classified as critical was found in PHPGurukul Zoo Management System 2.1. This vulnerability affects unknown code of the file /admin/add-normal-ticket.php. The manipulation of the argument cprice leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/08/2025, 04:24:26 UTC

Technical Analysis

CVE-2025-7161 is a SQL Injection vulnerability identified in version 2.1 of the PHPGurukul Zoo Management System, specifically within the /admin/add-normal-ticket.php file. The vulnerability arises from improper sanitization or validation of the 'cprice' parameter, which is used in SQL queries. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. The vulnerability does not require user interaction and can be exploited without authentication, increasing the risk of exploitation. The CVSS 4.0 score is 5.3, indicating a medium severity level, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is limited but present, as indicated by the low impact metrics in the CVSS vector. No known exploits are currently reported in the wild, and no official patches have been published yet. The vulnerability disclosure is recent, with public information available since July 2025.

Potential Impact

For European organizations using the PHPGurukul Zoo Management System version 2.1, this vulnerability poses a risk of unauthorized database access or manipulation. Potential impacts include exposure of sensitive data related to zoo operations, ticketing information, and possibly personal data of visitors or staff if stored in the database. Data integrity could be compromised, leading to inaccurate ticketing records or financial discrepancies. While the availability impact is low, successful exploitation could disrupt normal ticketing operations, affecting customer service and revenue. European organizations in the zoological and wildlife management sectors, especially those relying on this specific software, may face reputational damage and regulatory scrutiny under GDPR if personal data is exposed. The medium severity rating suggests that while the threat is not critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities.

Mitigation Recommendations

Organizations should immediately review and restrict access to the /admin/add-normal-ticket.php endpoint, implementing strict input validation and sanitization for the 'cprice' parameter. Employing prepared statements or parameterized queries in the application code will effectively prevent SQL injection. Until an official patch is released, consider deploying Web Application Firewalls (WAFs) with rules targeting SQL injection patterns on this endpoint. Conduct thorough code audits to identify similar injection points elsewhere in the application. Additionally, monitor database logs for suspicious queries and implement least privilege principles for database accounts used by the application. Regular backups of the database should be maintained to enable recovery in case of data tampering. Finally, organizations should stay updated with vendor communications for patches or updates addressing this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-07T06:55:42.128Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686c99f56f40f0eb72f12340

Added to database: 7/8/2025, 4:09:25 AM

Last enriched: 7/8/2025, 4:24:26 AM

Last updated: 7/8/2025, 4:24:26 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats