Overview
CVE-2025-45018 is a severe SQL Injection vulnerability discovered in the PHPGurukul Park Ticketing Management System v2.0. This vulnerability primarily affects organizations using this platform for their park ticket management, with potential impacts extending to their customers as well. The gravity of this vulnerability lies in its ability to allow remote attackers to execute arbitrary SQL code, potentially compromising the entire system or leading to data leakage.
Vulnerability Summary
CVE ID: CVE-2025-45018
Severity: Critical (9.8 CVSS Severity Score)
Attack Vector: Remote
Privileges Required: None
User Interaction: None
Impact: System compromise and potential data leakage
Affected Products
No phone number, email, or personal info required.
Product | Affected Versions
PHPGurukul Park Ticketing Management System | v2.0
How the Exploit Works
The SQL Injection vulnerability resides in the foreigner-bwdates-reports-details.php file of the PHPGurukul Park Ticketing Management System v2.0. It is exploitable via the ‘todate’ parameter. The vulnerability allows unvalidated and unsanitized input in the ‘todate’ parameter that an attacker can manipulate to inject and execute arbitrary SQL code. This could enable the attacker to read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system, and in some cases, issue commands to the operating system.
Conceptual Example Code
Here is a conceptual example of how the vulnerability might be exploited using an HTTP request:
GET /foreigner-bwdates-reports-details.php?todate=2025-12-31'; DROP TABLE users; -- HTTP/1.1
Host: target.example.com
In this example, the SQL command `’DROP TABLE users; –‘` is inserted into the ‘todate’ parameter. This injection could lead to the deletion of the ‘users’ table from the database if successfully executed. It is worth noting that this is just a conceptual example, and the actual exploit might involve more complex SQL commands, depending on the attacker’s intent and the database structure.
Mitigation Guidance
Organizations are advised to apply the vendor patch as soon as possible to correct this vulnerability. If the patch cannot be applied immediately, organizations should consider using a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) as temporary mitigation. These preventive measures, however, are not ultimate solutions and should be complemented with a timely system patch.