| Title | Codezips Gym Management System in PHP with Source Code V1.0 SQL Injection |
|---|
| Description | A critical SQL injection vulnerability exists in the id parameter within /dashboard/admin/gen_invoice.php. Attackers can inject arbitrary SQL code via specially crafted values, bypassing input validation. This could lead to unauthorized database access, data manipulation, and potentially full system compromise.
Database Compromise: Attackers can read, modify, or delete data.
Data Leakage: Sensitive customer/payment information could be exposed.
System Interruption: Malicious queries may degrade performance or crash the application.
Privilege Escalation: Potential elevation of privileges leading to broader system takeover. |
|---|
| Source | ⚠️ https://github.com/smartttt1/CVE/blob/main/CVE_1.md |
|---|
| User | smartttt1 (UID 81916) |
|---|
| Submission | 02/24/2025 12:12 PM (12 months ago) |
|---|
| Moderation | 03/02/2025 09:21 PM (6 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 298124 [Codezips Gym Management System 1.0 gen_invoice.php ID sql injection] |
|---|
| Points | 20 |
|---|