A vulnerability was found in PHPGurukul Local Services Search Engine Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /serviceman-search.php. The manipulation of the argument location leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/aionman/cve/issues/7 | Exploit Third Party Advisory Issue Tracking |
| https://phpgurukul.com/ | Product |
| https://vuldb.com/?ctiid.299885 | Permissions Required VDB Entry |
| https://vuldb.com/?id.299885 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.516546 | Third Party Advisory VDB Entry |
| https://github.com/aionman/cve/issues/7 | Exploit Third Party Advisory Issue Tracking |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-03-17 17:15
Updated : 2025-03-27 18:14
NVD link : CVE-2025-2386
Mitre link : CVE-2025-2386
CVE.ORG link : CVE-2025-2386
JSON object : View
Products Affected
phpgurukul
- local_services_search_engine_management_system
