VYPR
Unrated severityNVD Advisory· Published Mar 12, 2015· Updated May 6, 2026

CVE-2015-2237

CVE-2015-2237

Description

Multiple SQL injection vulnerabilities in Betster (aka PHP Betoffice) 1.0.4 allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) showprofile.php or (2) categoryedit.php or (3) username parameter in a login to index.php.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Betster (PHP Betoffice) 1.0.4 contains multiple SQL injection flaws via the `id` and `username` parameters, allowing unauthenticated remote attackers to execute arbitrary SQL commands.

Vulnerability

Betster (also known as PHP Betoffice) version 1.0.4 is vulnerable to multiple SQL injection attacks in several endpoints. The id parameter in showprofile.php and categoryedit.php, as well as the username parameter during login via index.php, are not properly sanitized before being used in SQL queries. This allows an attacker to inject arbitrary SQL commands directly into the database query. The vulnerability is present in all installations of version 1.0.4 [1].

Exploitation

Exploitation requires no authentication; the attacker can reach the vulnerable scripts directly from the network. By supplying crafted input to the id parameter (e.g., a numeric value followed by SQL injection syntax like ' OR '1'='1) or to the username field in the login form, the attacker can manipulate the underlying SQL query. For the login endpoint, injecting a malicious payload into the username parameter can bypass authentication entirely, as demonstrated in the public exploit code [1].

Impact

Successful exploitation allows an attacker to execute arbitrary SQL commands on the database backend. Depending on database permissions, this can lead to extraction of all data (including user credentials), modification or deletion of records, and potentially escalate to remote code execution if the database server permits file operations or command execution via SQL. The attacker effectively gains the ability to read, modify, or destroy any data accessible to the database user used by the application [1].

Mitigation

As of the publication date (2015-03-12), no official patch has been released for Betster 1.0.4. The application appears to be abandoned (last update in 2015). Users should immediately isolate any exposed instances, consider migrating to an alternative application, and apply input validation and parameterized queries as a general security measure. The exploit is publicly available and may be used by attackers targeting unpatched systems [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.