SQL Injection Vulnerability in PHPGurukul e-Diary Management System
CVE-2025-3217
6.9MEDIUM
Summary
The PHPGurukul e-Diary Management System version 1.0 is vulnerable to SQL injection through the manipulation of the 'emailid' argument in the /registration.php file. This flaw enables an attacker to execute arbitrary SQL queries remotely, potentially compromising the integrity and confidentiality of the database. The vulnerability has been publicly disclosed, raising concerns over the security of systems using this product.
Affected Version(s)
e-Diary Management System 1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
kuan4d3 (VulDB User)