SQL Injection Vulnerability in PHPGurukul Company Visitor Management System
CVE-2025-4332
Summary
The PHPGurukul Company Visitor Management System 2.0 has a vulnerability that arises from improper handling of input in the /visitor-detail.php file. This flaw allows for SQL injection through the editid argument, potentially allowing an attacker to execute arbitrary SQL queries against the database. Since this exploit can be launched remotely, it poses a significant threat to the confidentiality, integrity, and availability of data managed by the system. It is critical for organizations using this product to assess their exposure and implement appropriate security measures promptly.
Affected Version(s)
Company Visitor Management System 2.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved