A vulnerability, which was classified as critical, has been found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. This issue affects some unknown processing of the file /profile.php. The manipulation of the argument aid/adminname/mobilenumber/email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/SECWG/cve/issues/7 | Exploit Issue Tracking Third Party Advisory |
| https://phpgurukul.com/ | Product |
| https://vuldb.com/?ctiid.299873 | Permissions Required VDB Entry |
| https://vuldb.com/?id.299873 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.515429 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-03-17 11:15
Updated : 2025-05-08 19:04
NVD link : CVE-2025-2374
Mitre link : CVE-2025-2374
CVE.ORG link : CVE-2025-2374
JSON object : View
Products Affected
phpgurukul
- human_metapneumovirus_testing_management_system
