CVE-2018-25163
Received Received - Intake
SQL Injection in BitZoom 1.0 Allows Data Extraction

Publication date: 2026-03-06

Last updated on: 2026-03-06

Assigner: VulnCheck

Description
BitZoom 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the rollno and username parameters in forgot.php and login.php. Attackers can submit crafted POST requests with SQL UNION statements to extract database schema information and table contents from the application database.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-06
Last Modified
2026-03-06
Generated
2026-05-07
AI Q&A
2026-03-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
bitzoom bitzoom to 1.0 (exc)
bitzoom bitzoom 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2018-25163 is a high-severity SQL injection vulnerability affecting BitZoom version 1.0 and earlier. It allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious input through the "rollno" and "username" parameters in the "forgot.php" and "login.php" scripts.'}, {'type': 'paragraph', 'content': "Attackers exploit this vulnerability by sending crafted POST requests containing SQL UNION statements, which enables them to extract database schema details and table contents from the application's database."}] [1, 2]


How can this vulnerability impact me? :

This vulnerability can have significant impacts as it allows attackers to access sensitive database information without authentication.

  • Attackers can extract database schema information, including table and column names.
  • They can retrieve contents of database tables, potentially exposing sensitive user data.
  • The vulnerability has a high CVSS score (8.8), indicating a serious risk with network attack vector and no required privileges or user interaction.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This SQL injection vulnerability can be detected by sending crafted POST requests to the vulnerable endpoints forgot.php and login.php, targeting the 'rollno' and 'username' parameters with SQL injection payloads."}, {'type': 'paragraph', 'content': "A common detection method involves using SQL UNION SELECT statements to extract database schema information, such as table and column names, from the application's database."}, {'type': 'paragraph', 'content': 'For example, you can use curl commands to send POST requests with injection payloads like the following to test for vulnerability:'}, {'type': 'list_item', 'content': 'curl -X POST -d "rollno=1\' UNION SELECT 1,group_concat(table_name),3,4 FROM information_schema.tables-- -&username=test" http://target/forgot.php'}, {'type': 'list_item', 'content': 'curl -X POST -d "username=admin\' UNION SELECT 1,group_concat(column_name),3,4 FROM information_schema.columns WHERE table_name=\'users\'-- -&rollno=123" http://target/login.php'}, {'type': 'paragraph', 'content': 'These commands attempt to inject SQL code that retrieves database metadata, which if successful, indicates the presence of the vulnerability.'}] [1, 2]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': "Immediate mitigation steps include sanitizing and validating all user inputs, especially the 'rollno' and 'username' parameters in forgot.php and login.php, to prevent SQL injection."}, {'type': 'paragraph', 'content': 'Implement prepared statements or parameterized queries in the application code to ensure that user input is not directly concatenated into SQL queries.'}, {'type': 'paragraph', 'content': 'Additionally, restrict database permissions to limit the impact of any potential injection and monitor web server logs for suspicious POST requests targeting these parameters.'}, {'type': 'paragraph', 'content': 'If possible, apply any available patches or updates from the vendor addressing this vulnerability.'}] [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart