CVE-2025-1167
Published: 11 February 2025
Summary
CVE-2025-1167 is a medium-severity Injection (CWE-74) vulnerability in Mayurik Employee Management System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation of untrusted inputs like the 'id' argument in /hr_soft/admin/Update_User.php before database queries.
Requires timely remediation of the specific SQL injection flaw through patching or updating the vulnerable Employee Management System up to version 192.168.70.3.
Enables automated vulnerability scanning to identify the SQL injection vulnerability in the Update_User.php endpoint for prompt remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web app (/hr_soft/admin/Update_User.php) enables initial access via exploitation of public-facing application (T1190), abuse of server software component for execution or persistence (T1505 as assigned by VulDB), and collection from databases via arbitrary SQL queries (T1213.006).
NVD Description
A vulnerability was found in Mayuri K Employee Management System up to 192.168.70.3 and classified as critical. Affected by this issue is some unknown functionality of the file /hr_soft/admin/Update_User.php. The manipulation of the argument id leads to sql injection. The…
more
attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-1167 is a critical SQL injection vulnerability (CWE-74, CWE-89) in the Mayuri K Employee Management System up to version 192.168.70.3. The issue resides in an unknown functionality of the file /hr_soft/admin/Update_User.php, where manipulation of the "id" argument triggers the injection. Published on 2025-02-11, it carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
The vulnerability enables remote exploitation by attackers possessing low privileges, requiring no user interaction and low attack complexity. Successful exploitation allows limited impacts on confidentiality, integrity, and availability through SQL injection, potentially enabling unauthorized data access, modification, or disruption depending on the backend database privileges.
VulDB advisories provide further details, including submission and entry pages at https://vuldb.com/?ctiid.295070, https://vuldb.com/?id.295070, and https://vuldb.com/?submit.494725. The exploit has been publicly disclosed and may be used by attackers.
Details
- CWE(s)