SQL Injection Vulnerability in PHPGurukul Online Security Guards Hiring System
CVE-2025-2665

6.9MEDIUM

Key Information:

Vendor
PHPgurukul
Vendor
CVE Published:
23 March 2025

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A significant SQL injection vulnerability has been identified in the PHPGurukul Online Security Guards Hiring System version 1.0, specifically within the /admin/bwdates-reports-details.php file. This vulnerability occurs due to improper handling of the fromdate and todate parameters, allowing attackers to manipulate SQL queries. Exploitation can be achieved remotely, potentially leading to unauthorized access to sensitive data. Awareness of this vulnerability is crucial for maintaining data security and ensuring that appropriate patches are applied.

Affected Version(s)

Online Security Guards Hiring System 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

iC0rner (VulDB User)
.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.