SQL Injection Vulnerability in PHPGurukul COVID19 Testing Management System
CVE-2025-3972

6.9MEDIUM

Key Information:

Vendor

PHPgurukul

Vendor
CVE Published:
27 April 2025

Badges

👾 Exploit Exists

What is CVE-2025-3972?

A security flaw has been identified in PHPGurukul's COVID19 Testing Management System version 1.0. The vulnerability exists due to improper handling of input in the file /bwdates-report-result.php, specifically with the 'todate' argument, which can allow attackers to execute SQL injection attacks. This vulnerability can be exploited remotely, potentially compromising the integrity and confidentiality of the application's database. It is imperative for users of this software to assess their systems and apply necessary security measures to mitigate the risks associated with this vulnerability.

Affected Version(s)

COVID19 Testing Management System 1.0

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

l0ners (VulDB User)
.