VYPR
High severity8.2NVD Advisory· Published Mar 6, 2026· Updated Apr 15, 2026

CVE-2018-25161

CVE-2018-25161

Description

Warranty Tracking System 11.06.3 contains an SQL injection vulnerability that allows attackers to execute arbitrary SQL queries by injecting malicious code through the txtCustomerCode, txtCustomerName, and txtPhone POST parameters in SearchCustomer.php. Attackers can submit crafted SQL statements using UNION SELECT to extract sensitive database information including usernames, database names, and version details.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Warranty Tracking System 11.06.3 contains SQL injection in SearchCustomer.php via unsanitized POST parameters allowing data exfiltration.

Vulnerability

Details

Warranty Tracking System version 11.06.3 suffers from a classical SQL injection vulnerability in the SearchCustomer.php script. The root cause is that user-supplied input from the txtCustomerCode, txtCustomerName, and txtPhone POST parameters is directly concatenated into SQL queries without proper sanitization or parameterization. As shown in the source code, lines 85, 88, and 91 build a WHERE clause by appending the raw user input using string interpolation, and the resulting query is executed via the insecure mysql_query() function [1].

Exploitation

Prerequisites and Method

An attacker can exploit this vulnerability by sending a crafted HTTP POST request to the vulnerable endpoint. No prior authentication is required, as the search functionality is accessible to unauthenticated users. The exploit involves injecting a single quote (') to break out of the string context, followed by a UNION SELECT statement to retrieve arbitrary data from the database. The provided proof-of-concept demonstrates exfiltration of the current database user, database name, and MySQL version by leveraging the USER(), DATABASE(), and VERSION() functions [1].

Impact

Successful exploitation allows an attacker to execute arbitrary SQL queries, leading to unauthorized access to sensitive information stored in the underlying database. This can include user credentials, customer records, and other application data. The CVSS v3 base score is 8.2 (High), reflecting the low complexity and network-based attack vector without authentication requirements.

Mitigation

Status

As of the report date (November 2018), no patch has been released, and the vendor appears to have discontinued the product. Users are strongly advised to migrate to an alternative solution or implement a web application firewall (WAF) rule to block SQL injection payloads.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.