CVE-2018-25163
Published: 06 March 2026
Description
BitZoom 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the rollno and username parameters in forgot.php and login.php. Attackers can submit crafted POST requests with SQL UNION statements…
more
to extract database schema information and table contents from the application database.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents SQL injection by requiring validation and sanitization of user inputs such as the rollno and username parameters in forgot.php and login.php.
SI-9 enforces restrictions on information inputs at web application boundaries to block oversized or malformed SQL injection payloads.
SI-2 mitigates the CVE by identifying, reporting, and correcting the specific SQL injection flaw in the affected PHP components.
Security SummaryAI
CVE-2018-25163 is an SQL injection vulnerability (CWE-89) affecting BitZoom 1.0. The flaw exists in the forgot.php and login.php components, where the rollno and username parameters fail to properly sanitize user input, allowing injection of malicious SQL code. Published on 2026-03-06, it carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N), reflecting high severity due to its potential for remote exploitation.
Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By submitting crafted POST requests containing SQL UNION statements through the vulnerable parameters, they can execute arbitrary SQL queries to extract database schema information and contents from the application's database, enabling data exfiltration.
Advisories reference an Exploit-DB proof-of-concept at https://www.exploit-db.com/exploits/45862 and a Vulncheck advisory at https://www.vulncheck.com/advisories/bitzoom-sql-injection-via-rollno-parameter, which details the injection via the rollno parameter but provides no specific patch or mitigation guidance in the available CVE information.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web application (login/forgot pages) enables exploitation of public-facing apps (T1190) and arbitrary database queries for data collection from databases (T1213.006).