SQL Injection Vulnerability in PHPGurukul e-Diary Management System
CVE-2025-4249
Summary
A SQL injection vulnerability has been identified in the PHPGurukul e-Diary Management System version 1.0, specifically within the /manage-categories.php file. This vulnerability arises due to improper handling of the argument ID, allowing attackers to manipulate SQL queries and potentially gain unauthorized access to sensitive data. Remote exploitation of this flaw is possible, posing significant security risks. Public disclosure of the exploit increases the urgency for users to apply necessary patches and secure their installations. Vigilance and prompt action are recommended to mitigate associated risks.
Affected Version(s)
e-Diary Management System 1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved