PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.
References
| Link | Resource |
|---|---|
| https://github.com/dewcode91/security-research/blob/main/CVE-2025-65380.md | Third Party Advisory |
| https://phpgurukul.com/billing-system-using-php-and-mysql | Product |
Configurations
History
04 Dec 2025, 19:01
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:phpgurukul:billing_system:1.0:*:*:*:*:*:*:* | |
| First Time |
Phpgurukul billing System
Phpgurukul |
|
| References | () https://github.com/dewcode91/security-research/blob/main/CVE-2025-65380.md - Third Party Advisory | |
| References | () https://phpgurukul.com/billing-system-using-php-and-mysql - Product |
02 Dec 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CWE | CWE-89 |
02 Dec 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-02 21:15
Updated : 2025-12-04 19:01
NVD link : CVE-2025-65380
Mitre link : CVE-2025-65380
CVE.ORG link : CVE-2025-65380
JSON object : View
Products Affected
phpgurukul
- billing_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
