Security for everyone

CVE-2022-32025 Scanner

Detects 'SQL Injection (SQLi)' vulnerability in Car Rental Management System affects v. 1.0.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2022-32025 Scanner Detail

The Car Rental Management System is a software tool designed for businesses that rent and manage their car fleet. This system provides a simple and effective way to manage bookings, check-in and check-out processes, vehicle maintenance, and accounting. It is an all-in-one platform for car rental companies to operate their business more efficiently.

However, the system has a critical security flaw that leaves it open to potential attacks. CVE-2022-32025 is a vulnerability in the system that allows hackers to perform SQL injection attacks via the /car-rental-management-system/admin/view_car.php?id= endpoint. This vulnerability could allow unauthorized access to sensitive data or give attackers complete control over the system.

If exploited, this vulnerability can lead to various malicious activities, including theft of valuable and sensitive data, manipulation of billing and accounting processes, and disruption of business operations. Attackers can gain full access to the car rental system and use it to expose personal and financial data, which can be used for identity theft or other fraudulent activities.

In conclusion, businesses using the Car Rental Management System must ensure that they take the necessary precautions to protect their digital assets from potential cyber-attacks. By taking such precautions, they can safeguard their sensitive data from hackers and protect their business from loss due to disruptions or lost customer trust. is a powerful platform that provides up-to-date information on digital asset vulnerabilities, making it an invaluable resource for businesses aiming to secure their digital assets. By leveraging the pro features of, businesses can easily and quickly learn about vulnerabilities in their digital assets and take action to safeguard against them.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture