{"id":35769,"date":"2025-05-06T19:26:29","date_gmt":"2025-05-06T19:26:29","guid":{"rendered":""},"modified":"2025-09-29T02:50:03","modified_gmt":"2025-09-29T08:50:03","slug":"cve-2025-45018-sql-injection-vulnerability-in-phpgurukul-park-ticketing-management-system-v2-0","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-45018-sql-injection-vulnerability-in-phpgurukul-park-ticketing-management-system-v2-0\/","title":{"rendered":"<strong>CVE-2025-45018: SQL Injection Vulnerability in PHPGurukul Park Ticketing Management System v2.0<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>CVE-2025-45018 is a severe SQL Injection vulnerability discovered in the PHPGurukul Park Ticketing Management System v2.0. This vulnerability primarily affects organizations using this platform for their park ticket management, with potential impacts extending to their customers as well. The gravity of this vulnerability lies in its ability to allow remote attackers to execute arbitrary <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32432-remote-code-execution-vulnerability-in-craft-cms\/\"  data-wpil-monitor-id=\"40500\">SQL<\/a> code, potentially compromising the entire system or leading to data leakage.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-45018<br \/>\nSeverity: Critical (9.8 CVSS Severity Score)<br \/>\nAttack Vector: Remote<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3914-potential-arbitrary-file-uploads-and-system-compromise-in-aeropage-sync-for-airtable-wordpress-plugin\/\"  data-wpil-monitor-id=\"40575\">System compromise and potential<\/a> data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-2159033822\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-45949-phpgurukul-user-management-system-session-hijacking-vulnerability\/\"  data-wpil-monitor-id=\"41128\">PHPGurukul Park Ticketing Management System<\/a> | v2.0<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32863-sql-injection-vulnerability-in-telecontrol-server-basic\/\"  data-wpil-monitor-id=\"40459\">SQL Injection vulnerability<\/a> resides in the foreigner-bwdates-reports-details.php file of the PHPGurukul Park Ticketing Management System v2.0. It is <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-24274-input-validation-issue-exploitable-via-malicious-app-on-macos\/\"  data-wpil-monitor-id=\"86383\">exploitable via<\/a> the &#8216;todate&#8217; parameter. The vulnerability allows unvalidated and unsanitized input in the &#8216;todate&#8217; parameter that an attacker can manipulate to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-32968-vulnerability-in-xwiki-platform-allows-sql-injection\/\"  data-wpil-monitor-id=\"40457\">inject<\/a> and execute arbitrary SQL code. This could enable the attacker to read sensitive data from the database, modify database data (Insert\/Update\/Delete), <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-46193-remote-code-execution-vulnerability-in-sourcecodester-client-database-management-system-1-0\/\"  data-wpil-monitor-id=\"45289\">execute administration operations on the database<\/a> (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system, and in some cases, issue commands to the operating system.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-2550587142\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here is a conceptual example of how the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-1305-cross-site-request-forgery-csrf-vulnerability-in-newsblogger-wordpress-theme\/\"  data-wpil-monitor-id=\"42542\">vulnerability might be exploited using an HTTP request<\/a>:<\/p>\n<pre><code class=\"\" data-line=\"\">GET \/foreigner-bwdates-reports-details.php?todate=2025-12-31&#039;; DROP TABLE users; -- HTTP\/1.1\nHost: target.example.com<\/code><\/pre>\n<p>In this example, the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-51101-critical-sql-injection-vulnerability-in-phpgurukul-restaurant-table-booking-system\/\"  data-wpil-monitor-id=\"54376\">SQL command `&#8217;DROP TABLE<\/a> users; &#8211;&#8216;` is inserted into the &#8216;todate&#8217; parameter. This injection could lead to the deletion of the &#8216;<a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-1950-local-user-command-execution-vulnerability-in-ibm-hardware-management-console\/\"  data-wpil-monitor-id=\"40524\">users&#8217; table from the database if successfully executed<\/a>. It is worth noting that this is just a conceptual example, and the actual exploit might involve more complex SQL commands, depending on the attacker&#8217;s intent and the database structure.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>Organizations are advised to apply the vendor patch as soon as <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-54742-data-deserialization-vulnerability-in-wpevently-leading-to-possible-system-compromise\/\"  data-wpil-monitor-id=\"86382\">possible to correct this vulnerability<\/a>. If the patch cannot be applied immediately, organizations should consider using a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) as temporary mitigation. These preventive measures, however, are not <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-3921-unauthorized-modification-of-data-in-peprodev-ultimate-profile-solutions-plugin-for-wordpress\/\"  data-wpil-monitor-id=\"43932\">ultimate solutions<\/a> and should be complemented with a timely system patch.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview CVE-2025-45018 is a severe SQL Injection vulnerability discovered in the PHPGurukul Park Ticketing Management System v2.0. This vulnerability primarily affects organizations using this platform for their park ticket management, with potential impacts extending to their customers as well. The gravity of this vulnerability lies in its ability to allow remote attackers to execute arbitrary [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[74],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-35769","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-sql-injection"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/35769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=35769"}],"version-history":[{"count":11,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/35769\/revisions"}],"predecessor-version":[{"id":79184,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/35769\/revisions\/79184"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=35769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=35769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=35769"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=35769"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=35769"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=35769"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=35769"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=35769"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=35769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}