CVE Alert: CVE-2025-9749 – HKritesh009 – Grocery List Management Web App

CVE-2025-9749

HIGHNo exploitation known

A vulnerability was identified in HKritesh009 Grocery List Management Web App up to f491b681eb70d465f445c9a721415c965190f83b. This affects an unknown part of the file /src/update.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available.

CVSS v3.1 (7.3)
Vendor
HKritesh009
Product
Grocery List Management Web App
Versions
f491b681eb70d465f445c9a721415c965190f83b
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-08-31T22:32:06.213Z
Updated
2025-08-31T22:32:06.213Z

AI Summary Analysis

Risk verdict

Elevated risk: remote, unauthenticated SQL injection with a publicly available exploit, enabling data access/modification if reachable.

Why this matters

The vulnerability affects a web-facing component and can be triggered without user interaction, increasing exposure across organisations using the app. Combined with an active exploit, opportunistic attackers may enumerate or exfiltrate data, or alter records, with limited but tangible impact to integrity and confidentiality.

Most likely attack path

Network-accessible injection targets the update.php parameter, allowing an attacker to craft input that bypasses normal queries. No user credentials required, and current access scope remains unchanged, meaning potential lateral movement is limited to the application layer but remains feasible for data manipulation and leakage under the app’s DB permissions.

Who is most exposed

Sites hosting this grocery-list web app on internet-facing servers or shared hosting with rolling releases are at risk. Organisations relying on self-hosted or small-scale deployments without strong input sanitisation or DB-privilege controls are particularly vulnerable.

Detection ideas

  • Logs show unusual or malformed requests to update.php with suspicious ID values.
  • SQL error messages or DB error traces in app or server logs.
  • Increased failed authentication or abnormal API/user activity preceding data changes.
  • WAF alerts for SQLi patterns targeting update.php.
  • Indicator events in IOC/CTI feeds (public exploit indicators).

Mitigation and prioritisation

  • Patch or hotfix to parameterise queries and remove dynamic SQL in update.php; migrate to prepared statements.
  • Enforce least-privilege DB accounts and separate app DB user with restricted rights.
  • Implement input validation and canonicalisation for ID parameters; consider disabling direct access to update.php where feasible.
  • Deploy WAF rules targeting SQLi patterns and enable application-layer monitoring.
  • Change-management: test fix in staging, schedule immediate patching; monitor for attempted exploitation. If KEV or EPSS indicators become available, elevate to priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.