CVE-2025-2628
Published: 22 March 2025
Summary
CVE-2025-2628 is a medium-severity Injection (CWE-74) vulnerability in Phpgurukul Art Gallery Management System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by validating and sanitizing the 'eid' parameter at web application entry points to block malicious SQL payloads.
Requires timely identification, reporting, and remediation of the specific SQL injection flaw in /art-enquiry.php to eliminate the vulnerability.
Enforces restrictions on the 'eid' input such as data type, length, and format to reject SQL injection attempts at the application boundary.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web app (/art-enquiry.php) enables exploitation of public-facing applications (T1190), data collection from databases (T1213.006), and abuse of server software components (T1505, as noted in advisory).
NVD Description
A vulnerability, which was classified as critical, was found in PHPGurukul Art Gallery Management System 1.1. Affected is an unknown function of the file /art-enquiry.php. The manipulation of the argument eid leads to sql injection. It is possible to launch…
more
the attack remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-2628 is a critical SQL injection vulnerability (CWE-74, CWE-89) in PHPGurukul Art Gallery Management System version 1.1, published on 2025-03-22. The flaw resides in an unknown function within the file /art-enquiry.php, where manipulation of the 'eid' argument enables SQL injection.
The vulnerability is remotely exploitable over the network with low attack complexity and requires low privileges (PR:L), but no user interaction (UI:N). Per its CVSS 3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), attackers can achieve low impacts on confidentiality, integrity, and availability, such as limited data exposure, modification, or denial of service.
Advisories and details are referenced at https://github.com/ydnd/cve/issues/3, https://phpgurukul.com/, https://vuldb.com/?ctiid.300630, https://vuldb.com/?id.300630, and https://vuldb.com/?submit.519615. The exploit has been publicly disclosed and may be used, though no specific patch or mitigation steps are outlined in the CVE description.
Details
- CWE(s)