CVE-2025-2642
Published: 23 March 2025
Summary
CVE-2025-2642 is a high-severity Injection (CWE-74) vulnerability in Phpgurukul Art Gallery Management System. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents SQL injection by validating and sanitizing untrusted inputs such as editid, sprice, and description before they are used in database queries.
SI-2 requires timely identification, reporting, and remediation of flaws like the SQL injection vulnerability in /admin/edit-art-product-detail.php.
RA-5 mandates vulnerability scanning that would identify SQL injection issues like CVE-2025-2642 in the Art Gallery Management System.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web application (/admin/edit-art-product-detail.php) enables exploitation of public-facing apps (T1190), abuse of server software components (T1505 as noted in advisory), and collection from databases via arbitrary queries (T1213.006).
NVD Description
A vulnerability, which was classified as critical, was found in PHPGurukul Art Gallery Management System 1.0. This affects an unknown part of the file /admin/edit-art-product-detail.php?editid=2. The manipulation of the argument editide/sprice/description leads to sql injection. It is possible to initiate…
more
the attack remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-2642 is a critical SQL injection vulnerability in PHPGurukul Art Gallery Management System version 1.0. The issue resides in an unknown functionality of the file /admin/edit-art-product-detail.php?editid=2, where manipulation of the arguments editid, sprice, or description enables the injection. Classified under CWE-74 and CWE-89, it carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and was published on 2025-03-23.
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation allows limited impacts including low-level confidentiality breaches (e.g., data disclosure), integrity alterations (e.g., data modification), and availability disruptions (e.g., denial of service on affected components).
Advisories referenced in VulDB entries (ctiid.300657, id.300657, submit.519769) document the issue, while a GitHub repository (liuhao2638/cve/issues/3) discloses a public exploit. The vendor site at phpgurukul.com provides context on the affected software, though specific patch details are not detailed in available references.
The exploit has been publicly disclosed, increasing the risk of real-world attacks against exposed instances of this management system.
Details
- CWE(s)