CVE-2025-2675
Published: 24 March 2025
Summary
CVE-2025-2675 is a high-severity Injection (CWE-74) vulnerability in Anujkumar Bank Locker Management System. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely identification, reporting, testing, and correction of the SQL injection flaw in /add-lockertype.php.
Mandates validation of untrusted inputs like the 'lockerprice' argument to block SQL code injection.
Implements boundary protection to monitor and filter communications, blocking SQL injection payloads targeting the vulnerable endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in unauthenticated public-facing web application (/add-lockertype.php) enables exploitation of public-facing applications (T1190) and server software components (T1505) for remote database manipulation, as explicitly mapped in the advisory.
NVD Description
A vulnerability, which was classified as critical, has been found in PHPGurukul Bank Locker Management System 1.0. Affected by this issue is some unknown functionality of the file /add-lockertype.php. The manipulation of the argument lockerprice leads to sql injection. The…
more
attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-2675 is a critical SQL injection vulnerability (CWE-74, CWE-89) in PHPGurukul Bank Locker Management System 1.0. The flaw resides in an unknown functionality of the /add-lockertype.php file, where manipulation of the 'lockerprice' argument enables SQL code injection. Published on 2025-03-24, it carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
Unauthenticated remote attackers can exploit this vulnerability with low attack complexity and no user interaction required. By sending crafted requests to the vulnerable endpoint, attackers can execute arbitrary SQL queries, potentially leading to limited impacts on confidentiality (e.g., data exposure), integrity (e.g., data modification), and availability (e.g., denial of service).
Advisories reference VulDB entries (ctiid.300692, id.300692, submit.521442) and the vendor site phpgurukul.com for details, along with a GitHub issue at ARPANET-cyber/CVE/issues/4 disclosing a public exploit. No specific patches or mitigations are detailed in the available information.
The exploit has been publicly disclosed and may be used against affected systems.
Details
- CWE(s)