CVE-2025-56074
Published: 22 September 2025
Summary
CVE-2025-56074 is a critical-severity SQL Injection (CWE-89) vulnerability in Phpgurukul Park Ticketing Management System. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 37.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by validating and sanitizing the 'fromdate' parameter in POST requests to foreigner-bwdates-reports-details.php before database query execution.
Requires timely identification, reporting, and correction of the specific SQL injection flaw in the PHPGurukul Park Ticketing Management System v2.0.
Enables scanning for the SQL injection vulnerability in foreigner-bwdates-reports-details.php to identify and prioritize remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing Park Ticketing Management System enables exploitation of public-facing applications (T1190) and arbitrary data collection from databases (T1213.006).
NVD Description
A SQL Injection vulnerability was discovered in the foreigner-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary SQL code via the fromdate parameter in a POST request.
Deeper analysisAI
CVE-2025-56074 is a SQL injection vulnerability (CWE-89) affecting the foreigner-bwdates-reports-details.php file in PHPGurukul Park Ticketing Management System v2.0. Published on 2025-09-22T14:15:49.867, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue enables remote attackers to execute arbitrary SQL code by injecting payloads via the fromdate parameter in a POST request.
Unauthenticated attackers with network access can exploit this vulnerability due to its low attack complexity and lack of required privileges or user interaction. Exploitation allows high-impact consequences across confidentiality, integrity, and availability, such as extracting sensitive database information, modifying records, or causing denial of service.
References point to a GitHub repository documenting the SQL injection in foreigner-bwdates-reports-details.php, but no official advisories or patches detailing mitigation steps are provided in the available information.
Details
- CWE(s)