Featured image of post CVE-2025-61603

CVE-2025-61603

SQL Injection

CVE-2025-61603: SQL Injection (Blind Time-Based) Vulnerability in id_pet Parameter on /pet/profile_pet.php Endpoint

CVE Publication: https://www.cve.org/CVERecord?id=CVE-2025-61603

Summary

A SQL Injection vulnerability was discovered in the id_pet parameter of the /pet/profile_pet.php endpoint. This issue allows any attacker to inject arbitrary SQL queries, potentially leading to unauthorized data access or further exploitation depending on database configuration.

Details

The application fails to properly sanitize user-supplied input in the id_pet parameter. As a result, specially crafted SQL payloads are interpreted directly by the backend database.

PoC

Vulnerable Endpoint: /pet/profile_pet.php

Parameter: id_pet

Payload:

1
+AND+SLEEP(10)

Observe the time delay in the server response, indicating the successful execution of the SQL payload.

Impact

  • Unauthorized access to sensitive data (e.g., users, passwords, logs).
  • Database enumeration (schemas, tables, users, versions).
  • Escalation to RCE depending on DB configuration (e.g., xp_cmdshell, UDFs).
  • Full compromise of the application if chained with other vulnerabilities.
  • This issue affects all users and environments, as it does not require authentication and is reachable via a public endpoint.

Reference

https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8963-9833-gpx7

Finder

Marcelo Queiroz

By: CVE-Hunters

Built with Hugo
Theme Stack designed by Jimmy