Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7490: SQL Injection in PHPGurukul Vehicle Parking Management System

0
Medium
VulnerabilityCVE-2025-7490cvecve-2025-7490
Published: Sat Jul 12 2025 (07/12/2025, 20:32:06 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Vehicle Parking Management System

Description

A vulnerability was found in PHPGurukul Vehicle Parking Management System 1.13. It has been classified as critical. Affected is an unknown function of the file /admin/reg-users.php. The manipulation of the argument del leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/19/2025, 21:03:28 UTC

Technical Analysis

CVE-2025-7490 is a SQL Injection vulnerability identified in version 1.13 of the PHPGurukul Vehicle Parking Management System, specifically within the /admin/reg-users.php file. The vulnerability arises from improper sanitization or validation of the 'del' parameter, which is used in an SQL query. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. The vulnerability does not require user interaction and can be exploited without authentication, increasing its risk profile. The CVSS 4.0 base score is 5.3 (medium severity), reflecting that the attack vector is network-based with low attack complexity and no privileges or user interaction needed. The impact on confidentiality, integrity, and availability is rated low, suggesting that while exploitation is possible, the scope of damage may be limited or mitigated by other factors such as database permissions or application logic. No public exploits are currently known in the wild, but the exploit details have been disclosed publicly, which could lead to increased attempts to exploit this vulnerability. The lack of available patches or updates from the vendor at this time further elevates the risk for users of this specific version. SQL Injection vulnerabilities are critical because they can allow attackers to extract sensitive data, modify or delete records, or escalate privileges within the application environment if successfully exploited.

Potential Impact

For European organizations using PHPGurukul Vehicle Parking Management System version 1.13, this vulnerability could lead to unauthorized database access, data leakage, or manipulation of user records related to parking management. This could disrupt operational continuity, compromise personal data of employees or customers, and potentially violate GDPR requirements concerning data protection and breach notification. The ability to exploit remotely without authentication increases the risk of automated attacks or exploitation by external threat actors. Organizations relying on this system for critical parking infrastructure or access control may face operational disruptions or reputational damage if the vulnerability is exploited. Additionally, attackers could use the compromised system as a foothold to pivot into broader internal networks, especially if the parking management system is integrated with other enterprise systems or connected to internal networks without proper segmentation.

Mitigation Recommendations

1. Immediate mitigation should include restricting network access to the /admin/reg-users.php endpoint to trusted IP addresses only, using firewall rules or VPN access controls. 2. Implement Web Application Firewall (WAF) rules to detect and block SQL Injection patterns targeting the 'del' parameter. 3. Review and sanitize all user inputs rigorously, employing parameterized queries or prepared statements in the application code to prevent SQL Injection. 4. If possible, upgrade to a patched or newer version of the PHPGurukul Vehicle Parking Management System once available. 5. Conduct a thorough audit of database permissions to ensure the application user has the least privileges necessary, limiting potential damage from exploitation. 6. Monitor logs for unusual database queries or repeated access attempts to the vulnerable endpoint. 7. Consider isolating the parking management system on a segmented network zone to reduce lateral movement risk. 8. Prepare an incident response plan specific to this vulnerability, including data backup and recovery procedures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-11T14:17:04.376Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6872c98da83201eaacb5e1e1

Added to database: 7/12/2025, 8:46:05 PM

Last enriched: 7/19/2025, 9:03:28 PM

Last updated: 10/11/2025, 1:18:22 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats