EUVD-2025-17420

| CVE-2025-5856 HIGH
2025-06-09 [email protected]
7.3
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 19:21 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:21 euvd
EUVD-2025-17420
PoC Detected
Jun 10, 2025 - 14:56 vuln.today
Public exploit code
CVE Published
Jun 09, 2025 - 03:15 nvd
HIGH 7.3

DescriptionNVD

A vulnerability has been found in PHPGurukul BP Monitoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /registration.php. The manipulation of the argument emailid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AnalysisAI

Critical SQL injection vulnerability in PHPGurukul BP Monitoring Management System version 1.0, specifically in the /registration.php file's emailid parameter. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit details available, creating immediate risk for unpatched installations.

Technical ContextAI

The vulnerability exists in PHPGurukul BP Monitoring Management System 1.0, a PHP-based web application for blood pressure monitoring management. The root cause is classified as CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component, also known as 'Injection'), which in this context manifests as SQL injection. The emailid parameter in /registration.php fails to properly sanitize or parameterize user input before incorporating it into SQL queries. This allows attackers to inject malicious SQL syntax that gets executed by the backend database, typically MySQL or similar relational database systems used with PHP applications. The flaw is present in the application's user registration functionality, a common entry point since it typically accepts unauthenticated input.

RemediationAI

Immediate actions: (1) PATCH: Contact PHPGurukul or check their repository/website for version 1.1 or later with SQL injection fixes—if no official patch exists, migrate to an alternative maintained BP monitoring system; (2) INPUT VALIDATION: Implement parameterized queries (prepared statements) for all database interactions, specifically the /registration.php emailid parameter using bound parameters instead of string concatenation; (3) WEB APPLICATION FIREWALL (WAF): Deploy WAF rules to detect and block SQL injection attempts targeting /registration.php (detect common SQL keywords in emailid parameter); (4) DATABASE HARDENING: Limit database user permissions to minimal required privileges (principle of least privilege); (5) MONITORING: Enable SQL query logging and audit logging for registration endpoints to detect exploitation attempts; (6) DISABLE if not essential: If the registration functionality is not required, disable the /registration.php endpoint or restrict access by IP. Long-term: Migrate to actively maintained, security-reviewed BP monitoring software with regular security updates.

Share

EUVD-2025-17420 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy