CVE-2025-63532
Published: 01 December 2025
Summary
CVE-2025-63532 is a critical-severity SQL Injection (CWE-89) vulnerability in Shridharshukl Blood Bank Management System. Its CVSS base score is 9.6 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation and sanitization of user-supplied input like the search field before inclusion in SQL queries in cancel.php.
Remediates the specific SQL injection flaw in cancel.php through identification, reporting, and correction of the unsanitized input issue.
Vulnerability scanning and monitoring detects SQL injection vulnerabilities like CVE-2025-63532 in applications such as the Blood Bank Management System.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection vulnerability in the web application's cancel.php allows bypassing authentication and unauthorized access by exploiting a public-facing application.
NVD Description
A SQL injection vulnerability exists in the Blood Bank Management System 1.0 within the cancel.php component. The application fails to properly sanitize user-supplied input in SQL queries, allowing an attacker to inject arbitrary SQL code. By manipulating the search field,…
more
an attacker can bypass authentication and gain unauthorized access to the system.
Deeper analysisAI
CVE-2025-63532 is a SQL injection vulnerability (CWE-89) affecting Blood Bank Management System 1.0, specifically within the cancel.php component. Published on 2025-12-01T16:15:55.800, it carries a CVSS v3.1 base score of 9.6 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N). The vulnerability arises because the application does not properly sanitize user-supplied input in SQL queries, enabling attackers to inject arbitrary SQL code through manipulation of the search field.
An attacker with low privileges (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and without requiring user interaction (UI:N). Successful exploitation alters the scope (S:C) and results in high impacts to confidentiality (C:H) and integrity (I:H), with no availability impact (A:N). By injecting SQL via the search field, the attacker can bypass authentication mechanisms and gain unauthorized access to the system.
Advisories and additional details are available in the provided references, including a Google Drive document at https://drive.google.com/file/d/12yeOXW_sN69QjsQtW0_k9AGqozi1s0di/view?usp=sharing, the Blood Bank Management System GitHub repository at https://github.com/Shridharshukl/Blood-Bank-Management-System, and a CVE-specific page at https://github.com/kiwi865/CVEs/blob/main/CVE-2025-63532.md.
Details
- CWE(s)