CVE Alert: CVE-2025-9919 – 1000projects – Beauty Parlour Management System

CVE-2025-9919

HIGHNo exploitation knownPoC observed

A vulnerability was identified in 1000projects Beauty Parlour Management System 1.0. This affects an unknown function of the file /admin/bwdates-reports-details.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

CVSS v3.1 (7.3)
Vendor
1000projects
Product
Beauty Parlour Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-03T16:02:09.119Z
Updated
2025-09-03T19:12:45.598Z

AI Summary Analysis

Risk verdict

High risk with a remote, unauthenticated SQL injection on a web admin page; exploitation is supported by a public PoC and a disclosed vulnerability.

Why this matters

Compromise could expose or alter sensitive reporting data and disrupt administrative functions, potentially enabling data leakage or tampering of customer/financial information. The public PoC and network-accessible endpoint lower the barrier to exploitation, increasing the chance of opportunistic attacks affecting SME deployments.

Most likely attack path

An attacker can reach the vulnerable endpoint over the network, supply crafted fromdate/todate parameters, and trigger SQL injection without user interaction or privileges. The impact is primarily data exposure/modification within the affected database, with no required internal footholds; lateral movement beyond the specified database is less clearly indicated (Scope remains U), but the web-facing admin page is a high-value target.

Who is most exposed

Typical exposure is in small to medium-sized organisations using 1000projects Beauty Parlour Management System with internet-facing admin interfaces; deployments on shared hosting or on-premises servers are common.

Detection ideas

  • Unusual requests to /admin/bwdates-reports-details.php with suspicious date parameters
  • SQL error messages or database errors logged from the PHP page
  • spikes in access to the admin report endpoint or anomalous data retrieval patterns
  • WAF/IDS alerts for SQL injection signatures or abnormal query structures
  • Anomalous data access patterns in reporting data

Mitigation and prioritisation

  • Apply vendor patch or upgrade to a fixed release promptly
  • Implement parameterised queries and prepared statements; disable dynamic SQL in the affected component
  • Enforce authentication and IP allowlisting for admin endpoints; limit network exposure
  • Harden input validation and implement robust access controls; add least-privilege DB accounts
  • Change-management: test fixes in staging, schedule rapid production rollout; monitor post-deployment
  • Note: KEV status and EPSS score are not provided; escalate to priority 1 only if KEV is true or EPSS ≥ 0.5.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.