CVE-2025-1580
Published: 23 February 2025
Summary
CVE-2025-1580 is a medium-severity Injection (CWE-74) vulnerability in Phpgurukul Nipah Virus Testing Management System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 5.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly enforces validation and sanitization of the 'searchdata' input parameter to block SQL injection attacks in /search-report-result.php.
Requires identification, reporting, and correction of the specific SQL injection flaw in the Nipah Virus Testing Management System.
Mandates vulnerability scanning to identify SQL injection issues like CVE-2025-1580 and timely remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web application (/search-report-result.php) enables exploitation of public-facing apps (T1190), abuse of server software components/databases (T1505), and data collection from databases (T1213.006) via arbitrary SQL queries for access, modification, or deletion.
NVD Description
A vulnerability was found in PHPGurukul Nipah Virus Testing Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /search-report-result.php. The manipulation of the argument searchdata leads to sql injection. It is possible…
more
to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting parameter names to be affected.
Deeper analysisAI
CVE-2025-1580 is a critical SQL injection vulnerability (CWE-74, CWE-89) in PHPGurukul Nipah Virus Testing Management System 1.0. The flaw affects an unknown function within the file /search-report-result.php, where manipulation of the 'searchdata' argument triggers the injection. Published on 2025-02-23, it carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
The vulnerability is exploitable remotely by attackers possessing low privileges, requiring low attack complexity and no user interaction. Successful exploitation enables limited impacts on confidentiality, integrity, and availability, such as unauthorized data access, modification, or disruption via injected SQL queries. The exploit has been publicly disclosed and may be actively used.
Advisories provide further details via references including a GitHub issue at https://github.com/wqywfvc/CVE/issues/5, the vendor site at https://phpgurukul.com/, and VulDB entries at https://vuldb.com/?ctiid.296556, https://vuldb.com/?id.296556, and https://vuldb.com/?submit.504234. The initial researcher advisory notes contradicting parameter names as potentially affected.
Details
- CWE(s)