Cyber Posture

CVE-2025-1167

MediumPublic PoC

Published: 11 February 2025

Published
11 February 2025
Modified
26 May 2025
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0018 39.0th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems.

Security Summary

CVE-2025-1167 is a critical SQL injection vulnerability (CWE-74, CWE-89) in the Mayuri K Employee Management System up to version 192.168.70.3. The issue resides in an unknown functionality of the file /hr_soft/admin/Update_User.php, where manipulation of the "id" argument triggers the injection. Published on 2025-02-11, it carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

The vulnerability enables remote exploitation by attackers possessing low privileges, requiring no user interaction and low attack complexity. Successful exploitation allows limited impacts on confidentiality, integrity, and availability through SQL injection, potentially enabling unauthorized data access, modification, or disruption depending on the backend database privileges.

VulDB advisories provide further details, including submission and entry pages at https://vuldb.com/?ctiid.295070, https://vuldb.com/?id.295070, and https://vuldb.com/?submit.494725. The exploit has been publicly disclosed and may be used by attackers.

Details

CWE(s)
CWE-74CWE-89

Affected Products

mayurik
employee management system
≤ 192.168.70.3

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
T1505 Server Software Component Persistence
Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems.
Why these techniques?

SQL injection in public-facing web app (/hr_soft/admin/Update_User.php) enables initial access via exploitation of public-facing application (T1190), abuse of server software component for execution or persistence (T1505 as assigned by VulDB), and collection from databases via arbitrary SQL queries (T1213.006).

References