EUVD-2025-16623

| CVE-2025-5435 HIGH
2025-06-02 [email protected]
7.3
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 16:47 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 16:47 euvd
EUVD-2025-16623
CVE Published
Jun 02, 2025 - 08:15 nvd
HIGH 7.3

DescriptionNVD

A vulnerability was found in Marwal Infotech CMS 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /page.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AnalysisAI

Critical SQL injection vulnerability in Marwal Infotech CMS 1.0 affecting the /page.php file's ID parameter, allowing unauthenticated remote attackers to execute arbitrary SQL queries and potentially extract, modify, or delete database contents. The vulnerability has public exploit disclosure and proof-of-concept availability, but the vendor has not responded to early disclosure notifications, leaving affected deployments unpatched and at active risk.

Technical ContextAI

This vulnerability stems from improper input validation and parameterization in the /page.php endpoint, classified under CWE-74 (Improper Neutralization of Special Elements in Output, 'Injection'). The ID parameter accepts unsanitized user input that is directly incorporated into SQL queries without prepared statements or parameterized query mechanisms. Marwal Infotech CMS 1.0 is a PHP-based content management system; the vulnerability exists in the page retrieval logic where ID-based lookups likely construct dynamic SQL strings. The root cause reflects a fundamental failure to implement proper output encoding and query parameterization, allowing attackers to manipulate SQL syntax and inject arbitrary commands into the database query execution context.

RemediationAI

Immediate remediation options are severely constrained due to vendor non-responsiveness: (1) UPGRADE/REPLACE: Migrate away from Marwal Infotech CMS 1.0 to an actively maintained alternative CMS (WordPress, Drupal, Joomla with current patches); (2) WORKAROUND (temporary): Implement Web Application Firewall (WAF) rules blocking SQL injection payloads in the ID parameter (monitor for UNION, SELECT, DROP, INSERT in parameter values; use regex patterns for common SQL injection syntax); (3) INPUT VALIDATION (emergency patch): If source code access exists, immediately implement parameterized queries or prepared statements for all page.php database operations—replace dynamic SQL with bound parameters; (4) NETWORK ISOLATION: Restrict /page.php access via IP allowlisting or authentication layer; (5) DATABASE HARDENING: Apply principle of least privilege to database user accounts (read-only access where possible); enable SQL query logging and monitoring for anomalous activity. No official vendor patch is expected given non-responsiveness.

Share

EUVD-2025-16623 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy