CVE-2025-0803
📋 TL;DR
A critical SQL injection vulnerability in Codezips Gym Management System 1.0 allows attackers to manipulate database queries through the planid parameter in /dashboard/admin/submit_plan_new.php. This can lead to unauthorized data access, modification, or deletion. Organizations using this software are affected.
💻 Affected Systems
- Codezips Gym Management System
📦 What is this software?
Gym Management System by Gymmanagementsystem
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including sensitive member data theft, financial information exposure, and potential system takeover.
Likely Case
Unauthorized access to gym member personal information, payment details, and administrative credentials.
If Mitigated
Limited data exposure if proper input validation and database permissions are configured.
🎯 Exploit Status
Exploit details are publicly available on GitHub and vuldb.com.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None found
Restart Required: No
Instructions:
No official patch available. Manually sanitize planid parameter input in submit_plan_new.php using prepared statements or parameterized queries.
🔧 Temporary Workarounds
Input Validation and Sanitization
allAdd input validation to sanitize the planid parameter before processing SQL queries.
Modify submit_plan_new.php to use prepared statements: $stmt = $conn->prepare('SELECT * FROM plans WHERE id = ?'); $stmt->bind_param('i', $planid);
Web Application Firewall (WAF)
allDeploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint.
🧯 If You Can't Patch
- Restrict access to /dashboard/admin/submit_plan_new.php using IP whitelisting or authentication.
- Disable or remove the vulnerable file if functionality is not critical.
🔍 How to Verify
Check if Vulnerable:
Test the planid parameter with SQL injection payloads like ' OR '1'='1 in the vulnerable endpoint.
Check Version:
Check software version in admin panel or configuration files.
Verify Fix Applied:
Verify that SQL injection payloads no longer execute and return error messages.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts or parameter manipulation in web server logs
Network Indicators:
- HTTP requests to /dashboard/admin/submit_plan_new.php with SQL payloads in parameters
SIEM Query:
source="web_server" AND uri="/dashboard/admin/submit_plan_new.php" AND (param="planid" AND value MATCHES "('|--|OR|AND|SELECT|UNION)")