CVE-2025-65125

CRITICAL9.8/ 10.0
Share:
Published: January 2, 2026 at 03:16 PM
Modified: January 12, 2026 at 03:16 PM
Source: cve@mitre.org

Vulnerability Description

SQL injection in gosaliajainam/online-movie-booking 5.5 in movie_details.php allows attackers to gain sensitive information.

CVSS Metrics

Base Score
9.8
Severity
CRITICAL
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses (CWE)

Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0

AI Security Analysis

01 // Technical Summary

Critical vulnerability discovered in gosaliajainam/online-movie-booking version 5.5, allowing SQL injection via movie_details.php. This flaw enables attackers to potentially extract sensitive data, including user credentials and database contents, leading to severe data breaches and system compromise.

02 // Vulnerability Mechanism

Step 1: Identify Vulnerable Parameter: The attacker identifies the movie_details.php script and determines the parameter(s) used to fetch movie details (e.g., movie_id).

Step 2: Craft Malicious Payload: The attacker crafts a malicious SQL injection payload designed to extract sensitive information. This payload might include commands to retrieve usernames, passwords, or other database contents.

Step 3: Inject Payload: The attacker injects the crafted payload into the vulnerable parameter (e.g., movie_id) via a GET or POST request to movie_details.php.

Step 4: Execute Malicious Query: The server, lacking proper input validation, executes the attacker's injected SQL code as part of the database query.

Step 5: Data Exfiltration: The database server processes the malicious query and returns the results, which may include sensitive data, to the attacker. This could involve the attacker retrieving data from other tables or even dumping the entire database.

03 // Deep Technical Analysis

The vulnerability stems from a lack of proper input validation and sanitization in the movie_details.php script when handling user-supplied data. Specifically, the script likely constructs SQL queries using unsanitized input, allowing an attacker to inject malicious SQL code. The root cause is the direct concatenation of user-controlled data into SQL queries without using parameterized queries or other safe methods. This allows for the manipulation of the query's logic, enabling the attacker to retrieve, modify, or delete data from the database. The absence of input validation allows for the injection of malicious SQL commands, leading to unauthorized access and data exfiltration. The specific function or logic flaw is the insecure construction of SQL queries, likely using string concatenation instead of prepared statements.

CVE-2025-65125 - CRITICAL Severity (9.8) | Free CVE Database | 4nuxd