Home

Description

A vulnerability was found in RashminDungrani online-banking up to 2337ad552ea9d385b4e07b90e6f32d011b7c68a2. This affects an unknown part of the file /site/dist/auth_login.php. Performing manipulation of the argument Username results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2025-12-06 | Published 2025-12-07 | Updated 2025-12-08 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
HIGH: 7.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
HIGH: 7.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
7.5AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

SQL Injection

Injection

Product status

2337ad552ea9d385b4e07b90e6f32d011b7c68a2
affected

Timeline

2025-12-06:Advisory disclosed
2025-12-06:VulDB entry created
2025-12-06:VulDB entry last update

Credits

Brill (VulDB User) reporter

References

vuldb.com/?id.334612 (VDB-334612 | RashminDungrani online-banking auth_login.php sql injection) vdb-entry technical-description

vuldb.com/?ctiid.334612 (VDB-334612 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.699237 (Submit #699237 | online-banking web 1 SQL Injection) third-party-advisory

github.com/...ole-gap/blob/main/online-banking-have-sql.docx exploit

cve.org (CVE-2025-14192)

nvd.nist.gov (CVE-2025-14192)

Download JSON