A SQL Injection vulnerability was found in /admin/edit-propertytype.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the editid GET request parameter.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20p%20editid.pdf | Exploit Third Party Advisory | 
Configurations
                    History
                    28 Mar 2025, 18:35
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Phpgurukul
         Phpgurukul land Record System  | 
|
| Summary | 
        
        
  | 
|
| CPE | cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:* | |
| References | () https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20p%20editid.pdf - Exploit, Third Party Advisory | 
13 Feb 2025, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-89 | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 9.8  | 
13 Feb 2025, 17:17
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-02-13 17:17
Updated : 2025-03-28 18:35
NVD link : CVE-2025-25388
Mitre link : CVE-2025-25388
CVE.ORG link : CVE-2025-25388
JSON object : View
Products Affected
                phpgurukul
- land_record_system
 
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
