CVE-2025-2471
Published: 18 March 2025
Summary
CVE-2025-2471 is a medium-severity Injection (CWE-74) vulnerability in Phpgurukul Boat Booking System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validation of information inputs like the 'bid' parameter to prevent SQL injection attacks by ensuring proper neutralization of special elements.
SI-2 mandates timely remediation of identified flaws, such as patching the SQL injection vulnerability in /boat-details.php.
RA-5 requires vulnerability scanning that would identify the SQL injection issue in the Boat Booking System and trigger remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web application (/boat-details.php) enables exploitation of public-facing applications (T1190), data collection from databases via arbitrary SQL queries including blind and UNION techniques (T1213.006), and abuse of server software components as mapped in VulDB advisory (T1505).
NVD Description
A vulnerability, which was classified as critical, was found in PHPGurukul Boat Booking System 1.0. Affected is an unknown function of the file /boat-details.php. The manipulation of the argument bid leads to sql injection. It is possible to launch the…
more
attack remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-2471 is a critical SQL injection vulnerability in PHPGurukul Boat Booking System 1.0. The issue affects an unknown function within the file /boat-details.php, where manipulation of the 'bid' argument enables the injection. Recent CWE classifications include CWE-74 (Improper Neutralization of Special Elements used in an SQL Command) and CWE-89 (Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')).
The vulnerability allows remote exploitation over the network with low attack complexity and requires low privileges (PR:L), without user interaction. Successful attacks can result in low-level impacts to confidentiality, integrity, and availability, as scored at CVSS 6.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L). An authenticated user with low privileges could manipulate the 'bid' parameter to inject malicious SQL payloads.
Advisories and related details are available through references including a GitHub issue at https://github.com/1cfh/vuln-pub/issues/1, the vendor site at https://phpgurukul.com/, and VULDB entries at https://vuldb.com/?ctiid.299964, https://vuldb.com/?id.299964, and https://vuldb.com/?submit.517113.
The exploit has been publicly disclosed and may be used by attackers. The vulnerability was published on 2025-03-18T00:15:13.030.
Details
- CWE(s)