CVE-2025-2847
Published: 27 March 2025
Summary
CVE-2025-2847 is a medium-severity Injection (CWE-74) vulnerability in Codezips Gym Management System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 39.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of inputs like the 'mm' argument in /dashboard/admin/over_month.php to directly prevent SQL injection exploitation.
Mandates identification, reporting, and correction of critical flaws such as this SQL injection vulnerability in the Gym Management System.
Enables vulnerability scanning to identify SQL injection flaws like CVE-2025-2847, facilitating timely remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in web application (/dashboard/admin/over_month.php) enables exploitation of public-facing applications (T1190) and abuse of server software components (T1505, specifically vSphere or general web app components like T1505.006), allowing unauthorized database access, manipulation, and potential compromise as noted in advisories.
NVD Description
A vulnerability, which was classified as critical, has been found in Codezips Gym Management System 1.0. This issue affects some unknown processing of the file /dashboard/admin/over_month.php. The manipulation of the argument mm leads to sql injection. The attack may be…
more
initiated remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-2847 is a critical SQL injection vulnerability (CWE-74, CWE-89) in Codezips Gym Management System 1.0. The flaw affects the processing of the file /dashboard/admin/over_month.php, where manipulation of the "mm" argument enables SQL injection.
Remote attackers with low privileges (PR:L) can exploit the vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation yields limited impacts on confidentiality, integrity, and availability (C:L/I:L/A:L), as reflected in the CVSS v3.1 base score of 6.3 (S:U).
VulDB advisories, including entries at https://vuldb.com/?ctiid.301493 and https://vuldb.com/?id.301493, detail the issue, noting that an exploit has been publicly disclosed and may be used against vulnerable instances. No patches are referenced in available information.
The public availability of the exploit elevates the risk for deployments of the affected Gym Management System.
Details
- CWE(s)