CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4DescriptionNVD
A vulnerability was found in PHPGurukul Vehicle Parking Management System 1.13 and classified as critical. Affected by this issue is some unknown functionality of the file /users/signup.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AnalysisAI
CVE-2025-7480 is a critical SQL injection vulnerability in PHPGurukul Vehicle Parking Management System version 1.13, located in the /users/signup.php file where the email parameter is inadequately sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit code available, though no KEV or EPSS data is referenced in the provided intelligence.
Technical ContextAI
This vulnerability exploits improper input validation in a PHP web application using SQL as the backend query language. The root cause is classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), which relates to SQL injection through insufficient parameterization or escaping of user-controlled input. The affected file /users/signup.php handles user registration and fails to properly validate or sanitize the email parameter before incorporating it into SQL queries. The Vehicle Parking Management System is a PHP-based application managing parking operations, and the vulnerable code path is exposed through the signup endpoint, making it directly accessible without authentication (AV:N, PR:N in CVSS vector). The typical attack pattern involves injecting SQL metacharacters (single quotes, comments, or SQL keywords) into the email field to alter query logic.
RemediationAI
Immediate remediation actions: (1) Apply parameterized queries (prepared statements) to the /users/signup.php file, specifically for the email parameter validation in all SQL statements; (2) Implement input validation using a whitelist approach (validate email format using RFC 5322 regex or native PHP filter_var()); (3) Apply output encoding where applicable; (4) Deploy Web Application Firewall (WAF) rules to detect and block SQL injection patterns in signup requests. No vendor patch version is provided in the available intelligence—contact PHPGurukul directly for patch availability or check their official website/GitHub repository for updates beyond version 1.13. As an interim mitigation, disable or restrict access to the /users/signup.php endpoint if user registration is not immediately required. Conduct a forensic review of database access logs to determine if the vulnerability has been exploited in your environment.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21224