CVE-2025-8431
Description
A vulnerability has been found in PHPGurukul Boat Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/add-boat.php. The manipulation of the argument boatname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SQL injection in PHPGurukul Boat Booking System 1.0 via boatname parameter in /admin/add-boat.php allows remote attackers to execute arbitrary SQL queries.
Vulnerability
Overview
A critical SQL injection vulnerability exists in PHPGurukul Boat Booking System version 1.0, specifically in the /admin/add-boat.php file. The boatname parameter is directly concatenated into SQL queries without proper sanitization or validation, enabling attackers to inject malicious SQL statements [2]. This flaw is classified as critical with a CVSS v3 score of 7.3.
Exploitation
Details
The vulnerability can be exploited remotely without requiring authentication or prior authorization [2]. An attacker can craft a POST request to /admin/add-boat.php with a malicious boatname parameter containing SQL injection payloads. The provided proof-of-concept demonstrates time-based blind SQL injection using MySQL's SLEEP function, allowing attackers to extract data even without direct output [2].
Impact
Successful exploitation grants attackers unauthorized access to the underlying database. This can lead to sensitive data leakage, data tampering, and potential full system compromise. The attacker may also disrupt services by modifying or deleting critical data [2].
Mitigation
As of the publication date, no official patch has been released. The vendor's website (PHPGurukul) provides general guidance on using PDO for secure database interactions [1], but the affected application does not implement such measures. Users should apply input validation and parameterized queries immediately, or consider migrating to a secure alternative.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- cpe:2.3:a:phpgurukul:boat_booking_system:1.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/shiqumeng/myCVE/issues/3nvdExploitIssue TrackingThird Party Advisory
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- phpgurukul.comnvdProduct
- vuldb.comnvdPermissions RequiredVDB Entry
News mentions
0No linked articles in our index yet.