Cyber Posture

CVE-2025-1167

MediumPublic PoC

Published: 11 February 2025

Published
11 February 2025
Modified
26 May 2025
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0018 38.9th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1167 is a medium-severity Injection (CWE-74) vulnerability in Mayurik Employee Management System. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection by requiring validation of untrusted inputs like the 'id' argument in /hr_soft/admin/Update_User.php before database queries.

prevent

Requires timely remediation of the specific SQL injection flaw through patching or updating the vulnerable Employee Management System up to version 192.168.70.3.

detect

Enables automated vulnerability scanning to identify the SQL injection vulnerability in the Update_User.php endpoint for prompt remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
T1505 Server Software Component Persistence
Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems.
Why these techniques?

SQL injection in public-facing web app (/hr_soft/admin/Update_User.php) enables initial access via exploitation of public-facing application (T1190), abuse of server software component for execution or persistence (T1505 as assigned by VulDB), and collection from databases via arbitrary SQL queries (T1213.006).

NVD Description

A vulnerability was found in Mayuri K Employee Management System up to 192.168.70.3 and classified as critical. Affected by this issue is some unknown functionality of the file /hr_soft/admin/Update_User.php. The manipulation of the argument id leads to sql injection. The…

more

attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Deeper analysisAI

CVE-2025-1167 is a critical SQL injection vulnerability (CWE-74, CWE-89) in the Mayuri K Employee Management System up to version 192.168.70.3. The issue resides in an unknown functionality of the file /hr_soft/admin/Update_User.php, where manipulation of the "id" argument triggers the injection. Published on 2025-02-11, it carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

The vulnerability enables remote exploitation by attackers possessing low privileges, requiring no user interaction and low attack complexity. Successful exploitation allows limited impacts on confidentiality, integrity, and availability through SQL injection, potentially enabling unauthorized data access, modification, or disruption depending on the backend database privileges.

VulDB advisories provide further details, including submission and entry pages at https://vuldb.com/?ctiid.295070, https://vuldb.com/?id.295070, and https://vuldb.com/?submit.494725. The exploit has been publicly disclosed and may be used by attackers.

Details

CWE(s)

Affected Products

mayurik
employee management system
≤ 192.168.70.3

CVEs Like This One

CVE-2025-1596Same vendor: Mayurik
CVE-2025-1200Same vendor: Mayurik
CVE-2025-2601Same vendor: Mayurik
CVE-2025-2626Same vendor: Mayurik
CVE-2025-2602Same vendor: Mayurik
CVE-2025-1961Same vendor: Mayurik
CVE-2025-2046Same vendor: Mayurik
CVE-2025-1870Same vendor: Mayurik
CVE-2025-1872Same vendor: Mayurik
CVE-2025-1873Same vendor: Mayurik

References