2025-03-04 05:03:49 +00:00
{
"id" : "CVE-2025-1901" ,
"sourceIdentifier" : "cna@vuldb.com" ,
"published" : "2025-03-04T04:15:12.030" ,
2025-03-16 03:03:50 +00:00
"lastModified" : "2025-03-06T12:27:52.893" ,
2025-03-06 13:03:51 +00:00
"vulnStatus" : "Analyzed" ,
2025-03-04 05:03:49 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/check_availability.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
2025-03-06 13:03:51 +00:00
} ,
{
"lang" : "es" ,
2025-03-09 03:03:50 +00:00
"value" : "Se ha encontrado una vulnerabilidad en PHPGurukul Restaurant Table Booking System 1.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /admin/check_availability.php. La manipulaci\u00f3n del argumento username provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
2025-03-04 05:03:49 +00:00
}
] ,
"metrics" : {
"cvssMetricV40" : [
{
"source" : "cna@vuldb.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "4.0" ,
"vectorString" : "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" ,
"baseScore" : 6.9 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"attackRequirements" : "NONE" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"vulnConfidentialityImpact" : "LOW" ,
"vulnIntegrityImpact" : "LOW" ,
"vulnAvailabilityImpact" : "LOW" ,
"subConfidentialityImpact" : "NONE" ,
"subIntegrityImpact" : "NONE" ,
"subAvailabilityImpact" : "NONE" ,
"exploitMaturity" : "NOT_DEFINED" ,
"confidentialityRequirement" : "NOT_DEFINED" ,
"integrityRequirement" : "NOT_DEFINED" ,
"availabilityRequirement" : "NOT_DEFINED" ,
"modifiedAttackVector" : "NOT_DEFINED" ,
"modifiedAttackComplexity" : "NOT_DEFINED" ,
"modifiedAttackRequirements" : "NOT_DEFINED" ,
"modifiedPrivilegesRequired" : "NOT_DEFINED" ,
"modifiedUserInteraction" : "NOT_DEFINED" ,
"modifiedVulnConfidentialityImpact" : "NOT_DEFINED" ,
"modifiedVulnIntegrityImpact" : "NOT_DEFINED" ,
"modifiedVulnAvailabilityImpact" : "NOT_DEFINED" ,
"modifiedSubConfidentialityImpact" : "NOT_DEFINED" ,
"modifiedSubIntegrityImpact" : "NOT_DEFINED" ,
"modifiedSubAvailabilityImpact" : "NOT_DEFINED" ,
"Safety" : "NOT_DEFINED" ,
"Automatable" : "NOT_DEFINED" ,
"Recovery" : "NOT_DEFINED" ,
"valueDensity" : "NOT_DEFINED" ,
"vulnerabilityResponseEffort" : "NOT_DEFINED" ,
"providerUrgency" : "NOT_DEFINED"
}
}
] ,
"cvssMetricV31" : [
{
"source" : "cna@vuldb.com" ,
2025-03-04 19:03:50 +00:00
"type" : "Secondary" ,
2025-03-04 05:03:49 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" ,
"baseScore" : 7.3 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "LOW"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.4
2025-03-06 13:03:51 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
2025-03-04 05:03:49 +00:00
}
] ,
"cvssMetricV2" : [
{
"source" : "cna@vuldb.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
"baseScore" : 7.5 ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL"
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "cna@vuldb.com" ,
2025-03-23 03:03:54 +00:00
"type" : "Primary" ,
2025-03-04 05:03:49 +00:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-74"
} ,
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
2025-03-06 13:03:51 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "02963BE3-61BC-41D5-82BA-71B773AA8FA0"
}
]
}
]
2025-03-04 05:03:49 +00:00
}
] ,
"references" : [
{
"url" : "https://github.com/chenzi-dynasty/CVE/issues/1" ,
2025-03-06 13:03:51 +00:00
"source" : "cna@vuldb.com" ,
"tags" : [
"Exploit" ,
"Issue Tracking"
]
2025-03-04 05:03:49 +00:00
} ,
{
"url" : "https://phpgurukul.com/" ,
2025-03-06 13:03:51 +00:00
"source" : "cna@vuldb.com" ,
"tags" : [
"Product"
]
2025-03-04 05:03:49 +00:00
} ,
{
"url" : "https://vuldb.com/?ctiid.298419" ,
2025-03-06 13:03:51 +00:00
"source" : "cna@vuldb.com" ,
"tags" : [
"Permissions Required"
]
2025-03-04 05:03:49 +00:00
} ,
{
"url" : "https://vuldb.com/?id.298419" ,
2025-03-06 13:03:51 +00:00
"source" : "cna@vuldb.com" ,
"tags" : [
"Third Party Advisory"
]
2025-03-04 05:03:49 +00:00
} ,
{
"url" : "https://vuldb.com/?submit.506612" ,
2025-03-06 13:03:51 +00:00
"source" : "cna@vuldb.com" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2025-03-04 19:03:50 +00:00
} ,
{
"url" : "https://github.com/chenzi-dynasty/CVE/issues/1" ,
2025-03-06 13:03:51 +00:00
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"tags" : [
"Exploit" ,
"Issue Tracking"
]
2025-03-04 05:03:49 +00:00
}
]
}