CVE-2025-0541
Published: 17 January 2025
Summary
CVE-2025-0541 is a medium-severity Injection (CWE-74) vulnerability in Codezips Gym Management System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation of the manipulated 'name' argument in /dashboard/admin/edit_member.php.
Remediates the root SQL injection flaw through timely identification, reporting, and correction of the vulnerability in the Gym Management System.
Vulnerability scanning and monitoring detects SQL injection issues like CVE-2025-0541 in web applications for proactive remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection vulnerability allows remote exploitation of a public-facing web application (T1190), abuse of server software components via injected SQL queries (T1505), and collection of database contents using union-based, error-based, or blind techniques (T1213.006).
NVD Description
A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/edit_member.php. The manipulation of the argument name leads to sql injection. The attack may be initiated remotely.…
more
The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
Deeper analysisAI
CVE-2025-0541 is a SQL injection vulnerability affecting Codezips Gym Management System version 1.0. The flaw occurs in the processing of the file /dashboard/admin/edit_member.php, where manipulation of the "name" argument enables SQL injection. Published on 2025-01-17, it carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) and maps to CWE-74 and CWE-89. Other parameters may also be vulnerable.
An attacker with low privileges can exploit this remotely by injecting malicious SQL via the "name" parameter during member editing operations. Successful exploitation allows limited impacts: low confidentiality (e.g., partial data exposure), integrity (e.g., minor data alteration), and availability (e.g., minor service disruption) within the application's database.
References, including VulDB entries (ctiid.292433, id.292433, submit.480220) and a GitHub issue (nbeisss/CVE/issues/1), indicate the exploit has been publicly disclosed and may be used. No patches or specific mitigation guidance are mentioned in the available details.
Details
- CWE(s)