CVE-2025-65125

Source: cve@mitre.org

CRITICAL
9.8
Published: January 2, 2026 at 03:16 PM
Modified: January 12, 2026 at 03:16 PM

Vulnerability Description

SQL injection in gosaliajainam/online-movie-booking 5.5 in movie_details.php allows attackers to gain sensitive information.

CVSS Metrics

Base Score
9.8
Severity
CRITICAL
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses (CWE)

Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0

AI Security Analysis

01 // Technical Summary

Critical vulnerability discovered in gosaliajainam/online-movie-booking version 5.5, allowing SQL injection via movie_details.php. This flaw enables attackers to potentially extract sensitive data, including user credentials and database contents, leading to severe data breaches and system compromise.

02 // Vulnerability Mechanism

Step 1: Identify Vulnerable Parameter: The attacker identifies the movie_details.php script and determines the parameter(s) used to fetch movie details (e.g., movie_id).

Step 2: Craft Malicious Payload: The attacker crafts a malicious SQL injection payload designed to extract sensitive information. This payload might include commands to retrieve usernames, passwords, or other database contents.

Step 3: Inject Payload: The attacker injects the crafted payload into the vulnerable parameter (e.g., movie_id) via a GET or POST request to movie_details.php.

Step 4: Execute Malicious Query: The server, lacking proper input validation, executes the attacker's injected SQL code as part of the database query.

Step 5: Data Exfiltration: The database server processes the malicious query and returns the results, which may include sensitive data, to the attacker. This could involve the attacker retrieving data from other tables or even dumping the entire database.

03 // Deep Technical Analysis

The vulnerability stems from a lack of proper input validation and sanitization in the movie_details.php script when handling user-supplied data. Specifically, the script likely constructs SQL queries using unsanitized input, allowing an attacker to inject malicious SQL code. The root cause is the direct concatenation of user-controlled data into SQL queries without using parameterized queries or other safe methods. This allows for the manipulation of the query's logic, enabling the attacker to retrieve, modify, or delete data from the database. The absence of input validation allows for the injection of malicious SQL commands, leading to unauthorized access and data exfiltration. The specific function or logic flaw is the insecure construction of SQL queries, likely using string concatenation instead of prepared statements.

04 // Exploitation Status

Discovery Only. No public PoC or active exploitation has been reported yet, given the early publication date. However, the nature of SQL injection makes it highly likely that exploitation will occur once a PoC is developed or the vulnerability is better understood.

05 // Threat Intelligence

While no specific APTs or malware are directly linked at this time, SQL injection vulnerabilities are commonly exploited by a wide range of threat actors, including financially motivated groups and state-sponsored actors. This vulnerability presents a high risk due to its potential for widespread impact. CISA KEV status: Not applicable at this time.

06 // Detection & Hunting

  • Web Application Firewall (WAF) logs showing suspicious SQL syntax in requests to movie_details.php.

  • Database server logs indicating unusual query activity, such as unexpected queries or attempts to access sensitive tables.

  • Network traffic analysis revealing unusual HTTP requests containing SQL injection payloads (e.g., single quotes, comments, UNION statements) to the vulnerable script.

  • Intrusion Detection System (IDS) alerts triggered by SQL injection signatures.

  • File integrity monitoring detecting changes to movie_details.php or related configuration files.

07 // Remediation & Hardening

  • Implement parameterized queries (prepared statements) to prevent SQL injection. This is the most effective mitigation strategy.

  • Sanitize all user-supplied input before using it in SQL queries. Use input validation to ensure that the data conforms to expected formats and ranges.

  • Apply the principle of least privilege to the database user account used by the application. Limit the account's permissions to only the necessary operations.

  • Regularly update the application and its dependencies to patch known vulnerabilities.

  • Implement a Web Application Firewall (WAF) to filter malicious traffic.

  • Conduct regular security audits and penetration testing to identify and address vulnerabilities.

  • Review and harden the web server configuration to prevent unauthorized access.

08 // Affected Products

gosaliajainam/online-movie-booking 5.5
Advertisement