We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability, which was classified as critical, was found in PHPGurukul Online Notes Sharing System 1.0. This affects an unknown part of the file /Dashboard of the component Cookie Handler. The manipulation of the argument sessionid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The original researcher disclosure suspects an XPath Injection vulnerability; however, the provided attack payload appears to be characteristic of an SQL Injection attack.
Es wurde eine kritische Schwachstelle in PHPGurukul Online Notes Sharing System 1.0 gefunden. Dabei betrifft es einen unbekannter Codeteil der Datei /Dashboard der Komponente Cookie Handler. Durch das Beeinflussen des Arguments sessionid mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
2025-07-07: | Advisory disclosed |
2025-07-07: | VulDB entry created |
2025-07-07: | VulDB entry last update |
Subhash Paudel (VulDB User)
vuldb.com/?id.315093 (VDB-315093 | PHPGurukul Online Notes Sharing System Cookie Dashboard sql injection)
vuldb.com/?ctiid.315093 (VDB-315093 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.606281 (Submit #606281 | PHPGurukul Online Notes Sharing System 1.0 Improper Neutralization of Data within XPath Expressions)
github.com/...g-System-Php-Gurukul-Python-Xpath-Injection.md
github.com/...g-System-Php-Gurukul-Python-Xpath-Injection.md
phpgurukul.com/
Support options