CVE Alert: CVE-2025-10967 – MuFen-mker – PHP-Usermm

CVE-2025-10967

HIGHNo exploitation known

A vulnerability was detected in MuFen-mker PHP-Usermm up to 37f2d24e51b04346dfc565b93fc2fc6b37bdaea9. This affects an unknown part of the file /chkuser.php. Performing manipulation of the argument Username results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS v3.1 (7.3)
Vendor
MuFen-mker
Product
PHP-Usermm
Versions
37f2d24e51b04346dfc565b93fc2fc6b37bdaea9
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-25T20:02:10.381Z
Updated
2025-09-25T20:02:10.381Z

AI Summary Analysis

Risk verdict

High risk to externally facing web apps; remote SQL injection with a public exploit, requiring urgent attention. No KEV/EPSS data provided to escalate to Priority 1.

Why this matters

Public exposure increases automated attack activity aiming to exfiltrate or modify data. Realistic attacker goals include reading sensitive data, altering records, or compromising the web server’s integrity, especially where DB credentials or privileges are poorly restricted.

Most likely attack path

Network-accessible vector with no authentication required and no user interaction. Attackers can supply the Username parameter to trigger SQL statements against the database, enabling data access or modification; potential for broader impact if the application shares DB credentials or network access with other systems.

Who is most exposed

Externally facing MuFen-mker PHP-Usermm deployments, common in small to mid-sized organisations hosting PHP apps on shared or less-segmented infrastructure.

Detection ideas

  • Logs show SQL errors or syntax issues from chkuser.php requests.
  • HTTP requests containing suspicious Username payloads (SQL keywords, tautologies).
  • Unusual spikes in database query latency or data retrieved per user request.
  • WAF/IDS alerts for SQL injection patterns targeting Username.
  • Anomalous data volume or frequent access to user management endpoints.

Mitigation and prioritisation

  • Patch or upgrade to fixed release as soon as vendor provides one; monitor rolling-release updates.
  • Implement parameterised queries/prepared statements; avoid string concatenation in chkuser.php.
  • Enforce least-privilege DB accounts for the web app; disable unnecessary privileges.
  • Deploy WAF rules to block SQLi in the Username field; add input validation and sanitisation.
  • Change-management: test in staging, then push to production; if KEV true or EPSS ≥ 0.5, treat as priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.