CVE-2025-1188
Published: 12 February 2025
Summary
CVE-2025-1188 is a medium-severity Injection (CWE-74) vulnerability in Codezips Gym Management System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 37.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates SQL injection by requiring validation and sanitization of the 'tid' input parameter to neutralize special elements used in SQL commands.
Requires timely identification, reporting, and remediation of the SQL injection flaw in /dashboard/admin/updateroutine.php to eliminate the vulnerability.
Enables automated vulnerability scanning to identify SQL injection vulnerabilities like CVE-2025-1188 in the Gym Management System.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection vulnerability in public-facing web application (/dashboard/admin/updateroutine.php) enables exploitation of public-facing applications (T1190), collection from databases via arbitrary SQL queries (T1213.006), and abuse of server software components (T1505 as assigned by VulDB).
NVD Description
A vulnerability, which was classified as critical, has been found in Codezips Gym Management System 1.0. Affected by this issue is some unknown functionality of the file /dashboard/admin/updateroutine.php. The manipulation of the argument tid leads to sql injection. The attack…
more
may be launched remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-1188 is a critical SQL injection vulnerability in Codezips Gym Management System 1.0. The issue resides in an unknown functionality of the file /dashboard/admin/updateroutine.php, where manipulation of the 'tid' argument triggers the injection. It carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) and is linked to CWE-74 (Improper Neutralization of Special Elements used in an SQL Command) and CWE-89 (SQL Injection).
The vulnerability enables remote exploitation by attackers possessing low privileges, such as authenticated users with basic access. Exploitation requires network connectivity and low complexity, with no user interaction necessary. Successful attacks can result in limited impacts to confidentiality, integrity, and availability, potentially allowing unauthorized data access, modification, or disruption within the application's database.
Advisories referenced in VulDB entries (ctiid.295094, id.295094, submit.496409) and a GitHub repository document the issue, with the exploit publicly disclosed and available for use. No specific patches or mitigation steps are detailed in the provided information.
Details
- CWE(s)