Cyber Posture

CVE-2025-25357

HighPublic PoC

Published: 13 February 2025

Published
13 February 2025
Modified
14 February 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0265 85.8th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-25357 is a SQL injection vulnerability (CWE-89) affecting the /admin/contactus.php component in PHPGurukul Land Record System version 1.0. Published on 2025-02-13, it enables remote attackers to execute arbitrary code by injecting malicious payloads via the email POST request parameter. The issue carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.

Exploitation requires high privileges (PR:H), such as administrative access, and can be performed remotely over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). Attackers with the necessary permissions can inject SQL payloads into the email parameter, leading to arbitrary code execution and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H).

References include writeups hosted on GitHub at https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20Emails.pdf, which detail the SQL injection vulnerability in the email parameter but do not specify mitigation steps or patches.

Details

CWE(s)
CWE-89

Affected Products

phpgurukul
land record system
1.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL Injection vulnerability in public-facing web application (/admin/contactus.php) enables remote attackers to execute arbitrary code.

References