CVE-2025-5860

| EUVD-2025-17424 HIGH
2025-06-09 [email protected]
7.3
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
EUVD ID Assigned
Mar 14, 2026 - 19:21 euvd
EUVD-2025-17424
Analysis Generated
Mar 14, 2026 - 19:21 vuln.today
PoC Detected
Jun 09, 2025 - 19:03 vuln.today
Public exploit code
CVE Published
Jun 09, 2025 - 04:15 nvd
HIGH 7.3

DescriptionNVD

A vulnerability, which was classified as critical, was found in PHPGurukul Maid Hiring Management System 1.0. This affects an unknown part of the file /admin/search-booking-request.php. The manipulation of the argument searchdata leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AnalysisAI

SQL injection vulnerability in PHPGurukul Maid Hiring Management System 1.0 affecting the /admin/search-booking-request.php file, where unsanitized user input in the 'searchdata' parameter allows unauthenticated remote attackers to execute arbitrary SQL queries. With a CVSS score of 7.3 and publicly disclosed exploit code available, this vulnerability poses significant risk to confidentiality, integrity, and availability of affected systems. Active exploitation is likely given the public POC availability and network-accessible attack vector.

Technical ContextAI

This vulnerability exploits improper input validation in a PHP-based web application (PHPGurukul Maid Hiring Management System v1.0), specifically in the search functionality of the admin panel. The root cause is classified as CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), which encompasses SQL injection attacks. The searchdata parameter is directly incorporated into SQL queries without parameterized prepared statements or input sanitization. The application uses a PHP backend with likely MySQL/MariaDB database, and the vulnerability exists in an administrative endpoint that should theoretically require authentication, but the CVSS vector (PR:N - no privileges required) indicates the search functionality is accessible without authentication or with easily bypassed authentication checks.

RemediationAI

Immediate actions: (1) Disable or restrict network access to /admin/search-booking-request.php via firewall/WAF rules until patching is complete; (2) Check PHPGurukul's official repository (GitHub/website) for security patches - upgrade to the latest available version if available; (3) Apply WAF rules to block SQL injection patterns in the searchdata parameter (e.g., union, select, drop, exec, script injection patterns); (4) Implement input validation: whitelist allowed characters in searchdata, enforce maximum input length, and use parameterized prepared statements (PHP MySQLi with prepared statements or PDO with bound parameters) in search-booking-request.php. Code fix example: replace direct string concatenation with prepared statements: $stmt = $mysqli->prepare("SELECT * FROM bookings WHERE field = ?"); $stmt->bind_param("s", $_GET['searchdata']); (5) Conduct database audit for evidence of compromise (SQL logs, unauthorized data access); (6) Reset admin credentials if the system was exposed; (7) Monitor for active exploitation attempts in web server logs (requests containing SQL keywords in searchdata parameter). If vendor patch is unavailable, consider temporary migration to alternative booking systems or complete code review and hardening.

Share

CVE-2025-5860 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy