Submit #495410: Codezips Gym Management System in PHP with Source Code V1.0 SQL Injectioninfo

TitleCodezips Gym Management System in PHP with Source Code V1.0 SQL Injection
DescriptionA critical SQL injection vulnerability exists in the login_idparameter within /dashboard/admin/more-userprofile.php. Attackers can inject arbitrary SQL code via specially crafted values, bypassing input validation. This could lead to unauthorized database access, data manipulation, and potentially full system compromise. ● Database Compromise: Attackers can read, modify, or delete data. ● Data Leakage: Sensitive customer/payment information could be exposed. ● System Interruption: Malicious queries may degrade performance or crash the application. ● Privilege Escalation: Potential elevation of privileges leading to broader system takeover.
Source⚠️ https://www.yuque.com/polaris-pisym/aevk1q/fyu4dy8fglbs6rzy?singleDoc# 《/dashboard/admin/more-userprofile.php》
User
 xuanluansec (UID 68581)
Submission02/05/2025 02:58 PM (1 Year ago)
Moderation02/10/2025 12:05 PM (5 days later)
StatusAccepted
VulDB entry295087 [CodeZips Gym Management System 1.0 more-userprofile.php login_id sql injection]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!