CVE-2025-1894
Published: 04 March 2025
Summary
CVE-2025-1894 is a high-severity Injection (CWE-74) vulnerability in Phpgurukul Restaurant Table Booking System. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents SQL injection by enforcing validation and sanitization of untrusted inputs like the searchdata parameter in /search-result.php.
SI-2 requires timely remediation of the known SQL injection flaw in the Restaurant Table Booking System, eliminating the vulnerability through patching.
SC-7 provides boundary protection via web application firewalls to block SQL injection payloads targeting the public /search-result.php endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in unauthenticated public-facing web application (/search-result.php) enables exploitation of public-facing app (T1190), unauthorized access to databases for data collection (T1213.006), and manipulation of stored database data (T1565.001).
NVD Description
A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /search-result.php. The manipulation of the argument searchdata leads to sql injection. The…
more
attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-1894 is a critical SQL injection vulnerability (CWE-74, CWE-89) affecting PHPGurukul Restaurant Table Booking System version 1.0. The issue resides in unknown functionality of the file /search-result.php, where manipulation of the searchdata argument enables SQL injection. It carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and was published on 2025-03-04T02:15:35.380.
The vulnerability can be exploited remotely over the network by unauthenticated attackers with low attack complexity and no user interaction required. Successful exploitation grants low-level impacts on confidentiality, integrity, and availability, potentially allowing data exfiltration, modification, or disruption within the application's database.
Advisories and further details are available in references including VulDB entries (https://vuldb.com/?ctiid.298412, https://vuldb.com/?id.298412, https://vuldb.com/?submit.506592), the vendor site (https://phpgurukul.com/), and a GitHub disclosure (https://github.com/Maochuyue/cve/issues/1), where the exploit has been publicly released and may be used.
Details
- CWE(s)