VYPR
High severity7.3NVD Advisory· Published Aug 19, 2025· Updated Apr 29, 2026

CVE-2025-9150

CVE-2025-9150

Description

A vulnerability was identified in Surbowl dormitory-management-php up to 9f1d9d1f528cabffc66fda3652c56ff327fda317. Affected is an unknown function of the file /admin/violation_add.php?id=2. Such manipulation of the argument ID leads to sql injection. The attack may be performed from a remote location. The exploit is publicly available and might be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. This vulnerability only affects products that are no longer supported by the maintainer.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in Surbowl dormitory-management-php via 'id' parameter in violation_add.php allows remote unauthenticated attackers to execute arbitrary SQL queries.

Vulnerability

Overview

A SQL injection vulnerability exists in the Surbowl dormitory-management-php project, specifically in the file /admin/violation_add.php?id=2. The root cause is the lack of input validation and sanitization on the id GET parameter, which is directly concatenated into SQL queries. This allows an attacker to inject malicious SQL statements by manipulating the id parameter [1].

Exploitation

The attack can be performed remotely without any authentication. An attacker simply sends a crafted HTTP GET request to the vulnerable endpoint with a malicious id value. For example, a time-based blind SQL injection payload such as id=2 AND (SELECT 2331 FROM (SELECT(SLEEP(5)))ClgD) can be used to extract information from the database [1]. No special privileges or network position is required.

Impact

Successful exploitation enables an attacker to gain unauthorized access to the underlying database. This can lead to sensitive data leakage, data tampering, and potentially full system compromise. The impact is severe as it threatens the confidentiality, integrity, and availability of the application and its data [1].

Mitigation

The product uses a rolling release model, and version information for affected or fixed releases is not disclosed. However, the vulnerability only affects versions that are no longer supported by the maintainer. Users are advised to discontinue use of unsupported versions or upgrade to a supported release if available. No official patch has been announced, and the exploit is publicly available [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.