EUVD-2025-18815

| CVE-2025-6409 HIGH
2025-06-21 [email protected]
7.3
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 21:35 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 21:35 euvd
EUVD-2025-18815
PoC Detected
Jun 24, 2025 - 18:55 vuln.today
Public exploit code
CVE Published
Jun 21, 2025 - 16:15 nvd
HIGH 7.3

DescriptionNVD

A vulnerability was found in PHPGurukul Art Gallery Management System 1.1 and classified as critical. This issue affects some unknown processing of the file /admin/forgot-password.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AnalysisAI

CVE-2025-6409 is a critical SQL injection vulnerability in PHPGurukul Art Gallery Management System 1.1 affecting the /admin/forgot-password.php endpoint. An unauthenticated remote attacker can manipulate the 'email' parameter to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or denial of service. The vulnerability has been publicly disclosed with proof-of-concept availability, making it actively exploitable in the wild.

Technical ContextAI

The vulnerability stems from improper input validation and parameterization in the forgot-password functionality, classified under CWE-74 (Improper Neutralization of Special Elements in Output). The affected component is a PHP-based web application (CPE would be cpe:2.3:a:phpgurukul:art_gallery_management_system:1.1:*:*:*:*:*:*:*) that fails to sanitize user-supplied email input before incorporating it into SQL queries. This is a classic SQL injection flaw where special characters and SQL metacharacters are not escaped or parameterized statements are not used, allowing attackers to break out of intended query context and execute arbitrary SQL commands against the backend database.

RemediationAI

Immediate actions: (1) Update PHPGurukul Art Gallery Management System to the latest patched version beyond 1.1 if available; (2) If patched version unavailable, implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns in the email parameter (keywords: UNION, SELECT, OR 1=1, etc.); (3) Apply input validation to the email parameter using strict whitelist/regex matching (valid email format only); (4) Use prepared statements/parameterized queries for all database interactions in forgot-password.php; (5) Implement proper error handling to avoid information disclosure through SQL error messages; (6) Run security audit of all other user input endpoints in the application. Contact PHPGurukul project maintainers for patch availability and timeline.

Share

EUVD-2025-18815 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy