We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability has been found in PHPGurukul Employee Record Management System 1.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /editmyeducation.php. The manipulation of the argument coursepg/yophsc leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
In PHPGurukul Employee Record Management System 1.3 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Es geht um eine nicht näher bekannte Funktion der Datei /editmyeducation.php. Durch Manipulation des Arguments coursepg/yophsc mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
2025-05-01: | Advisory disclosed |
2025-05-01: | VulDB entry created |
2025-06-06: | VulDB entry last update |
valli (VulDB User)
vuldb.com/?id.306805 (VDB-306805 | PHPGurukul Employee Record Management System editmyeducation.php sql injection)
vuldb.com/?ctiid.306805 (VDB-306805 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.561816 (Submit #561816 | PHPGurukul Employee Record Management System V1.3 SQL Injection)
vuldb.com/?submit.591204 (Submit #591204 | PHPGurukul Employee Record Management System 1.3 SQL Injection (Duplicate))
github.com/ideal-valli/myCVE/issues/3
phpgurukul.com/
Support options