A SQL Injection vulnerability was found in /admin/contactus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the email POST request parameter.
References
| Link | Resource |
|---|---|
| https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20Emails.pdf | Exploit Third Party Advisory |
| https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20Emails.pdf | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-02-13 16:16
Updated : 2025-02-14 19:38
NVD link : CVE-2025-25357
Mitre link : CVE-2025-25357
CVE.ORG link : CVE-2025-25357
JSON object : View
Products Affected
phpgurukul
- land_record_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
