First published: Wed Feb 26 2025(Updated: )
A SQL Injection vulnerability was found in /admin/add-propertytype.php in PHPGurukul Land Record System Project in PHP v1.0 allows remote attackers to execute arbitrary code via the propertytype POST request parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGurukul Land Record System | ||
PHP | ||
PHPGurukul Land Record System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-25462 is considered high due to the potential for remote code execution through SQL injection.
To fix CVE-2025-25462, validate and sanitize all user inputs, particularly the propertytype POST request parameter to prevent SQL injection.
CVE-2025-25462 affects PHPGurukul Land Record System Project version 1.0 and any environment where PHP is used without proper input validations.
Yes, CVE-2025-25462 can be exploited remotely by sending specially crafted requests to the affected PHP script.
SQL Injection in the context of CVE-2025-25462 refers to an attacker manipulating SQL queries through the propertytype POST request, allowing execution of arbitrary code.