CVE-2025-4191

A vulnerability has been found in PHPGurukul Employee Record Management System 1.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /editmyeducation.php. The manipulation of the argument coursepg/yophsc leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
References
Link Resource
https://github.com/ideal-valli/myCVE/issues/3 Exploit Third Party Advisory
https://phpgurukul.com/ Product
https://vuldb.com/?ctiid.306805 Permissions Required
https://vuldb.com/?id.306805 Third Party Advisory VDB Entry
https://vuldb.com/?submit.561816 Third Party Advisory VDB Entry
https://vuldb.com/?submit.591204
https://github.com/ideal-valli/myCVE/issues/3 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpgurukul:employee_record_management_system:1.3:*:*:*:*:*:*:*

History

06 Jun 2025, 07:15

Type Values Removed Values Added
References
  • () https://vuldb.com/?submit.591204 -
Summary (en) A vulnerability has been found in PHPGurukul Employee Record Management System 1.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /editmyeducation.php. The manipulation of the argument coursepg leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. (en) A vulnerability has been found in PHPGurukul Employee Record Management System 1.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /editmyeducation.php. The manipulation of the argument coursepg/yophsc leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

09 May 2025, 13:41

Type Values Removed Values Added
CPE cpe:2.3:a:phpgurukul:employee_record_management_system:1.3:*:*:*:*:*:*:*
Summary
  • (es) Se ha encontrado una vulnerabilidad en PHPGurukul Employee Record Management System 1.3, clasificada como crítica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /editmyeducation.php. La manipulación del argumento coursepg provoca una inyección SQL. El ataque puede ejecutarse remotamente. Se ha hecho público el exploit y puede que sea utilizado.
First Time Phpgurukul employee Record Management System
Phpgurukul
References () https://github.com/ideal-valli/myCVE/issues/3 - () https://github.com/ideal-valli/myCVE/issues/3 - Exploit, Third Party Advisory
References () https://phpgurukul.com/ - () https://phpgurukul.com/ - Product
References () https://vuldb.com/?ctiid.306805 - () https://vuldb.com/?ctiid.306805 - Permissions Required
References () https://vuldb.com/?id.306805 - () https://vuldb.com/?id.306805 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.561816 - () https://vuldb.com/?submit.561816 - Third Party Advisory, VDB Entry

02 May 2025, 13:15

Type Values Removed Values Added
References () https://github.com/ideal-valli/myCVE/issues/3 - () https://github.com/ideal-valli/myCVE/issues/3 -

02 May 2025, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-02 00:15

Updated : 2025-06-06 07:15


NVD link : CVE-2025-4191

Mitre link : CVE-2025-4191

CVE.ORG link : CVE-2025-4191


JSON object : View

Products Affected

phpgurukul

  • employee_record_management_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')