CVE-2025-15242
Unknown Unknown - Not Provided
Race Condition in PHPEMS Coupon Handler Allows Remote Exploit

Publication date: 2025-12-30

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was detected in PHPEMS up to 11.0. The impacted element is an unknown function of the component Coupon Handler. Performing a manipulation results in race condition. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitability is regarded as difficult. The exploit is now public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-30
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
phpems php_exam_management_system 11.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-362 The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-15242 is a race condition vulnerability in PHPEMS version 11.0 and earlier, specifically in the coupon recharge function. The system fails to enforce atomicity checks on coupon usage and inventory, allowing an attacker to send multiple concurrent requests using the same valid coupon code. This enables repeated recharge of the same coupon across multiple user accounts simultaneously, exploiting a timing window where shared resources are accessed without proper exclusive control. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized accumulation of virtual assets or financial losses if the coupons are linked to real currency. Attackers can exploit the flaw to recharge multiple accounts using the same coupon code, resulting in improper transaction handling and potential integrity violations in the system's coupon management. [1, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for multiple concurrent requests using the same valid coupon code targeting the coupon recharge function. Detection involves observing unusual patterns of coupon usage where multiple user accounts are credited simultaneously with the same coupon, but only one redemption record is logged. A practical approach is to analyze web server logs or application logs for concurrent POST requests to the coupon recharge endpoint with identical coupon codes. Additionally, running scripts similar to the proof-of-concept exploit that simulate concurrent coupon recharge requests can help verify the presence of the race condition. Specific commands would depend on your environment, but for example, using tools like curl or custom scripts to send concurrent requests with the same coupon code and monitoring the backend redemption records can reveal the issue. [1, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing database row-level locking during coupon recharge operations to ensure atomicity, enforcing real-time validation of coupon usage status to prevent multiple redemptions, and restricting the frequency of recharge requests to prevent concurrent exploitation. Since no known countermeasures or patches are currently available, replacing the affected component with an alternative product is also suggested. Monitoring and limiting concurrent requests to the coupon recharge function can reduce the risk of exploitation until a permanent fix is applied. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart