CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4DescriptionNVD
A vulnerability, which was classified as critical, was found in PHPGurukul Maid Hiring Management System 1.0. This affects an unknown part of the file /admin/search-booking-request.php. The manipulation of the argument searchdata leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AnalysisAI
SQL injection vulnerability in PHPGurukul Maid Hiring Management System 1.0 affecting the /admin/search-booking-request.php file, where unsanitized user input in the 'searchdata' parameter allows unauthenticated remote attackers to execute arbitrary SQL queries. With a CVSS score of 7.3 and publicly disclosed exploit code available, this vulnerability poses significant risk to confidentiality, integrity, and availability of affected systems. Active exploitation is likely given the public POC availability and network-accessible attack vector.
Technical ContextAI
This vulnerability exploits improper input validation in a PHP-based web application (PHPGurukul Maid Hiring Management System v1.0), specifically in the search functionality of the admin panel. The root cause is classified as CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), which encompasses SQL injection attacks. The searchdata parameter is directly incorporated into SQL queries without parameterized prepared statements or input sanitization. The application uses a PHP backend with likely MySQL/MariaDB database, and the vulnerability exists in an administrative endpoint that should theoretically require authentication, but the CVSS vector (PR:N - no privileges required) indicates the search functionality is accessible without authentication or with easily bypassed authentication checks.
RemediationAI
Immediate actions: (1) Disable or restrict network access to /admin/search-booking-request.php via firewall/WAF rules until patching is complete; (2) Check PHPGurukul's official repository (GitHub/website) for security patches - upgrade to the latest available version if available; (3) Apply WAF rules to block SQL injection patterns in the searchdata parameter (e.g., union, select, drop, exec, script injection patterns); (4) Implement input validation: whitelist allowed characters in searchdata, enforce maximum input length, and use parameterized prepared statements (PHP MySQLi with prepared statements or PDO with bound parameters) in search-booking-request.php. Code fix example: replace direct string concatenation with prepared statements: $stmt = $mysqli->prepare("SELECT * FROM bookings WHERE field = ?"); $stmt->bind_param("s", $_GET['searchdata']); (5) Conduct database audit for evidence of compromise (SQL logs, unauthorized data access); (6) Reset admin credentials if the system was exposed; (7) Monitor for active exploitation attempts in web server logs (requests containing SQL keywords in searchdata parameter). If vendor patch is unavailable, consider temporary migration to alternative booking systems or complete code review and hardening.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17424