CVE-2025-11505

7.3 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute SQL injection attacks via the 'delid' parameter in the /admin/new-appointment.php file of PHPGurukul Beauty Parlour Management System 1.1. This can lead to unauthorized database access, data manipulation, or potential system compromise. Organizations using this specific version of the software are affected.

💻 Affected Systems

Products:
  • PHPGurukul Beauty Parlour Management System
Versions: 1.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the /admin/new-appointment.php endpoint to be accessible; default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, manipulation, or deletion; potential privilege escalation to system-level access; possible remote code execution if database configuration permits.

🟠

Likely Case

Unauthorized access to sensitive customer and business data stored in the database; manipulation of appointment records; potential extraction of administrative credentials.

🟢

If Mitigated

Limited impact with proper input validation and database permissions; SQL injection attempts logged and blocked; no data exfiltration.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires access to admin interface; SQL injection via delid parameter is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://phpgurukul.com/

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add parameterized queries or input validation to the delid parameter in new-appointment.php

Edit /admin/new-appointment.php to use prepared statements with PDO or mysqli

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the delid parameter

Configure WAF to block SQL injection patterns in POST/GET parameters

🧯 If You Can't Patch

  • Restrict access to /admin/ directory to trusted IP addresses only
  • Disable or remove the new-appointment.php file if not required

🔍 How to Verify

Check if Vulnerable:

Test the delid parameter in /admin/new-appointment.php with SQL injection payloads (e.g., ' OR '1'='1)

Check Version:

Check system documentation or configuration files for version information

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and return appropriate error messages

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts to admin interface
  • Requests to /admin/new-appointment.php with suspicious delid values

Network Indicators:

  • HTTP requests containing SQL keywords (SELECT, UNION, etc.) in delid parameter
  • Unusual traffic patterns to admin endpoints

SIEM Query:

source="web_logs" AND uri="/admin/new-appointment.php" AND (param="delid" AND value MATCHES "(?i)(union|select|insert|update|delete|drop|or|and)")

🔗 References

📤 Share & Export