VYPR
High severity7.3NVD Advisory· Published Sep 25, 2025· Updated Apr 29, 2026

CVE-2025-10967

CVE-2025-10967

Description

A vulnerability was detected in MuFen-mker PHP-Usermm up to 37f2d24e51b04346dfc565b93fc2fc6b37bdaea9. This affects an unknown part of the file /chkuser.php. Performing manipulation of the argument Username results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in PHP User Management System /chkuser.php allows unauthenticated remote attackers to execute arbitrary SQL queries.

Vulnerability

Overview

CVE-2025-10967 describes a SQL injection vulnerability in the PHP User Management System, a project hosted on GitHub by MuFen-mker. The flaw resides in the /chkuser.php file, where the username POST parameter is directly concatenated into SQL queries without proper sanitization or parameterization. This root cause allows an attacker to inject arbitrary SQL commands by manipulating the username value [1].

Exploitation

The vulnerability is remotely exploitable without any authentication. An attacker can send a crafted POST request to /chkuser.php with a malicious username parameter. The provided proof-of-concept demonstrates a boolean-based blind SQL injection payload that can be used to extract information from the database [1]. No special privileges or network position is required beyond network access to the application.

Impact

Impact

Successful exploitation enables an attacker to perform unauthorized database operations, including reading, modifying, or deleting sensitive data. This can lead to full database compromise, data leakage, and potential system control. The impact is rated as High with a CVSS v3 score of 7.3, reflecting the ease of exploitation and the severity of potential data breaches [1].

Mitigation

The vendor was contacted but did not respond. The project uses a rolling release model, and no specific patched version has been identified. Users should apply input validation and parameterized queries to the username parameter in /chkuser.php as a workaround. Given the public availability of exploit details, immediate remediation is strongly recommended [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.