SQL Injection Flaw in PHPGurukul Land Record System
CVE-2025-25357
7.2HIGH
Summary
The PHPGurukul Land Record System v1.0 has a SQL Injection vulnerability located in the /admin/contactus.php file. This issue permits remote attackers to execute arbitrary SQL commands through the manipulation of the email POST request parameter, which can potentially lead to unauthorized access and the execution of malicious code within the system.
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved