Cyber Posture

CVE-2025-1902

HighPublic PoC

Published: 04 March 2025

Published
04 March 2025
Modified
06 March 2025
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0007 20.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may leverage databases to mine valuable information.

Security Summary

CVE-2025-1902 is a critical SQL injection vulnerability (CWE-74, CWE-89) affecting PHPGurukul Student Record System version 3.2. The flaw exists in unknown code within the /password-recovery.php file, where manipulation of the 'emailid' argument enables SQL injection. Published on 2025-03-04, it carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).

The vulnerability can be exploited remotely by unauthenticated attackers with network access and low complexity requirements. By injecting malicious SQL payloads via the 'emailid' parameter during password recovery requests, attackers can achieve limited impacts on confidentiality, integrity, and availability of the affected system.

Advisories and references, including VulDB entries (ctiid.298420, id.298420, submit.506623), a GitHub code audit at panghuanjie/Code-audits/issues/3, and the vendor site phpgurukul.com, document the issue. The exploit has been publicly disclosed and may be used by attackers.

In notable context, the public availability of the exploit increases the risk of immediate exploitation against unpatched instances of this student record management system.

Details

CWE(s)
CWE-74CWE-89

Affected Products

phpgurukul
student record system
3.2

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505 Server Software Component Persistence
Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection vulnerability in public-facing web application (/password-recovery.php) enables exploitation of public-facing applications (T1190), abuse of server software components (T1505), and collection of data from databases (T1213.006).

References