CVE-2025-61455
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-20

Last updated on: 2025-10-21

Assigner: MITRE

Description
SQL Injection vulnerability exists in Bhabishya-123 E-commerce 1.0, specifically within the signup.inc.php endpoint. The application directly incorporates unsanitized user inputs into SQL queries, allowing unauthenticated attackers to bypass authentication and gain full access.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-20
Last Modified
2025-10-21
Generated
2026-05-07
AI Q&A
2025-10-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bhabishya-123 e-commerce 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a critical SQL Injection flaw in the Bhabishya-123 E-commerce 1.0 application, specifically in the signup.inc.php endpoint. It occurs because the application directly uses unsanitized user inputs in SQL queries, particularly through the 'email' parameter, without proper input validation or prepared statements. This allows attackers to inject malicious SQL code, enabling time-based blind SQL injection attacks that can bypass authentication and gain unauthorized access. [1]


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to full authentication bypass, unauthorized access to privileged features, data exfiltration, data manipulation or deletion, complete compromise of the backend database, and even possible remote code execution. This means attackers can take over the application, steal or alter sensitive data, and potentially execute arbitrary code on the server. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the signup.inc.php endpoint for SQL injection, especially targeting the 'email' parameter with time-based blind SQL injection payloads. You can use tools like sqlmap to automate detection. For example, a command could be: sqlmap -u "http://target/e-commerce-main/includes/[email protected]" --data="[email protected]&aid=1" --technique=T --time-sec=5 --dbs. Additionally, manual testing by injecting SQL payloads into the 'email' parameter and observing response delays or errors can help detect the issue. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include replacing dynamic SQL queries with prepared statements (e.g., using mysqli_prepare() or PDO), implementing strict input validation and sanitization on all user inputs, deploying a Web Application Firewall (WAF) to block SQL injection patterns, conducting regular code audits and penetration testing, using parameterized queries for all database interactions, and applying allowlists for input validation where feasible. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart