Skip to main content

CVE-2025-7927: SQL Injection in PHPGurukul Online Banquet Booking System

Medium
VulnerabilityCVE-2025-7927cvecve-2025-7927
Published: Mon Jul 21 2025 (07/21/2025, 14:32:06 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Online Banquet Booking System

Description

A vulnerability has been found in PHPGurukul Online Banquet Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/view-user-queries.php. The manipulation of the argument viewid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/21/2025, 15:01:11 UTC

Technical Analysis

CVE-2025-7927 is a SQL Injection vulnerability identified in version 1.0 of the PHPGurukul Online Banquet Booking System, specifically within the /admin/view-user-queries.php file. The vulnerability arises from improper sanitization or validation of the 'viewid' parameter, which is used in SQL queries. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the backend database. This could lead to unauthorized data disclosure, modification, or deletion, depending on the database permissions and structure. The vulnerability does not require user interaction and can be exploited over the network without authentication, increasing its risk profile. The CVSS 4.0 base score is 5.3, categorized as medium severity, reflecting that while the attack vector is network-based and requires no user interaction, it does require some privileges (PR:L) and has limited impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). No known exploits are currently reported in the wild, but the exploit details have been publicly disclosed, which could facilitate future exploitation attempts.

Potential Impact

For European organizations using the PHPGurukul Online Banquet Booking System version 1.0, this vulnerability poses a risk of unauthorized access to sensitive customer and booking data. This could lead to data breaches involving personal information, potentially violating GDPR and other data protection regulations, resulting in legal and financial repercussions. The integrity of booking data could be compromised, affecting business operations and customer trust. Availability impact is limited but could occur if attackers manipulate or delete critical data. Since the vulnerability is exploitable remotely without user interaction, attackers could automate attacks against exposed systems. Organizations in the hospitality and event management sectors across Europe that rely on this software may face operational disruptions and reputational damage if exploited.

Mitigation Recommendations

Immediate mitigation should include restricting access to the /admin/view-user-queries.php page to trusted IP addresses or VPNs to reduce exposure. Organizations should implement web application firewalls (WAFs) with rules to detect and block SQL injection payloads targeting the 'viewid' parameter. Since no official patch is currently available, administrators should review and sanitize all inputs rigorously, applying parameterized queries or prepared statements in the codebase if possible. Regularly monitor logs for suspicious query patterns or repeated access attempts to the vulnerable endpoint. Additionally, consider isolating the booking system from the internet or placing it behind additional authentication layers until a vendor patch is released. Conduct security audits and penetration tests to identify other potential injection points. Finally, maintain up-to-date backups to enable recovery in case of data tampering or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-21T06:25:55.162Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687e52aea83201eaac10603e

Added to database: 7/21/2025, 2:46:06 PM

Last enriched: 7/21/2025, 3:01:11 PM

Last updated: 8/9/2025, 2:43:10 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats