PHPGurukul Complaint Management System 2.0 /admin/edit-state.php Gaskiya SQL Injection

Hakika vulnerability da aka rarraba a matsayin kura an gano a PHPGurukul Complaint Management System 2.0. Tabbas, aikin $software_function ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil /admin/edit-state.php, a cikin sashi $software_component. Wuro manipulation of the argument Gaskiya ga SQL Injection. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-89. Lalle, rauni an sanar da shi 06/04/2025. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2025-5654. Ngam yiɗi ka a tuma ndiyam ka internet. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a github.com. 0-day ga, an ndiyam a wuro be $0-$5k. If you want to get best quality of vulnerability data, you may have to visit VulDB.

3 Goyarwa · 97 Datenpunkte

FurɗeSúgá
06/04/2025 14:47
Gargadi 1/2
06/05/2025 14:10
Gargadi 2/2
06/11/2025 03:28
cvss3_meta_tempscore5.75.76.9
cvss4_vuldb_bscore5.35.35.3
cvss4_vuldb_btscore2.12.12.1
advisory_date1748988000 (06/04/2025)1748988000 (06/04/2025)1748988000 (06/04/2025)
price_0day$0-$5k$0-$5k$0-$5k
software_vendorPHPGurukulPHPGurukulPHPGurukul
software_nameComplaint Management SystemComplaint Management SystemComplaint Management System
software_version2.02.02.0
software_file/admin/edit-state.php/admin/edit-state.php/admin/edit-state.php
software_argumentdescriptiondescriptiondescription
vulnerability_cweCWE-89 (SQL Injection)CWE-89 (SQL Injection)CWE-89 (SQL Injection)
vulnerability_risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
advisory_urlhttps://github.com/f1rstb100d/myCVE/issues/43https://github.com/f1rstb100d/myCVE/issues/43https://github.com/f1rstb100d/myCVE/issues/43
exploit_availability111
exploit_publicity111
exploit_urlhttps://github.com/f1rstb100d/myCVE/issues/43https://github.com/f1rstb100d/myCVE/issues/43https://github.com/f1rstb100d/myCVE/issues/43
source_cveCVE-2025-5654CVE-2025-5654CVE-2025-5654
cna_responsibleVulDBVulDBVulDB
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss4_vuldb_avNNN
cvss4_vuldb_acLLL
cvss4_vuldb_uiNNN
cvss4_vuldb_vcLLL
cvss4_vuldb_viLLL
cvss4_vuldb_vaLLL
cvss4_vuldb_ePPP
cvss2_vuldb_auSSS
cvss2_vuldb_rlNDNDND
cvss3_vuldb_prLLL
cvss3_vuldb_rlXXX
cvss4_vuldb_atNNN
cvss4_vuldb_prLLL
cvss4_vuldb_scNNN
cvss4_vuldb_siNNN
cvss4_vuldb_saNNN
cvss2_vuldb_basescore6.56.56.5
cvss2_vuldb_tempscore5.65.65.6
cvss3_vuldb_basescore6.36.36.3
cvss3_vuldb_tempscore5.75.75.7
cvss3_meta_basescore6.36.37.1
euvd_idEUVD-2025-16986EUVD-2025-16986
cve_nvd_summaryA vulnerability was found in PHPGurukul Complaint Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit-state.php. The manipulation of the argument description leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
cve_nvd_summaryesSe encontró una vulnerabilidad en PHPGurukul Complaint Management System 2.0, clasificada como crítica. Este problema afecta a una funcionalidad desconocida del archivo /admin/edit-state.php. La manipulación de la descripción del argumento provoca una inyección SQL. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prL
cvss4_cna_uiN
cvss4_cna_vcL
cvss4_cna_viL
cvss4_cna_vaL
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore5.3
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cvss3_cna_basescore6.3
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore8.8
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auS
cvss2_cna_ciP
cvss2_cna_iiP
cvss2_cna_aiP
cvss2_cna_basescore6.5

Do you want to use VulDB in your project?

Use the official API to access entries easily!