CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4DescriptionNVD
A vulnerability has been found in PHPGurukul BP Monitoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /registration.php. The manipulation of the argument emailid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AnalysisAI
Critical SQL injection vulnerability in PHPGurukul BP Monitoring Management System version 1.0, specifically in the /registration.php file's emailid parameter. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has been publicly disclosed with exploit details available, creating immediate risk for unpatched installations.
Technical ContextAI
The vulnerability exists in PHPGurukul BP Monitoring Management System 1.0, a PHP-based web application for blood pressure monitoring management. The root cause is classified as CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component, also known as 'Injection'), which in this context manifests as SQL injection. The emailid parameter in /registration.php fails to properly sanitize or parameterize user input before incorporating it into SQL queries. This allows attackers to inject malicious SQL syntax that gets executed by the backend database, typically MySQL or similar relational database systems used with PHP applications. The flaw is present in the application's user registration functionality, a common entry point since it typically accepts unauthenticated input.
RemediationAI
Immediate actions: (1) PATCH: Contact PHPGurukul or check their repository/website for version 1.1 or later with SQL injection fixes—if no official patch exists, migrate to an alternative maintained BP monitoring system; (2) INPUT VALIDATION: Implement parameterized queries (prepared statements) for all database interactions, specifically the /registration.php emailid parameter using bound parameters instead of string concatenation; (3) WEB APPLICATION FIREWALL (WAF): Deploy WAF rules to detect and block SQL injection attempts targeting /registration.php (detect common SQL keywords in emailid parameter); (4) DATABASE HARDENING: Limit database user permissions to minimal required privileges (principle of least privilege); (5) MONITORING: Enable SQL query logging and audit logging for registration endpoints to detect exploitation attempts; (6) DISABLE if not essential: If the registration functionality is not required, disable the /registration.php endpoint or restrict access by IP. Long-term: Migrate to actively maintained, security-reviewed BP monitoring software with regular security updates.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17420