CVE-2025-4332

A vulnerability was found in PHPGurukul Company Visitor Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /visitor-detail.php. The manipulation of the argument editid/remark leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/ctf2868/pjwww/issues/1 Exploit Third Party Advisory Issue Tracking
https://phpgurukul.com/ Product
https://vuldb.com/?ctiid.307436 Permissions Required VDB Entry
https://vuldb.com/?id.307436 Third Party Advisory VDB Entry
https://vuldb.com/?submit.564339 Third Party Advisory VDB Entry
https://vuldb.com/?submit.564729 Third Party Advisory VDB Entry
https://vuldb.com/?submit.568338 Third Party Advisory VDB Entry
https://vuldb.com/?submit.590559 Third Party Advisory VDB Entry
https://github.com/Pjwww13447/pjwww/issues/1 Exploit Third Party Advisory Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpgurukul:company_visitor_management_system:2.0:*:*:*:*:*:*:*

History

30 Sep 2025, 14:34

Type Values Removed Values Added
References () https://github.com/ctf2868/pjwww/issues/1 - Exploit, Third Party Advisory () https://github.com/ctf2868/pjwww/issues/1 - Exploit, Third Party Advisory, Issue Tracking
References () https://vuldb.com/?ctiid.307436 - Permissions Required () https://vuldb.com/?ctiid.307436 - Permissions Required, VDB Entry
References () https://vuldb.com/?submit.564729 - () https://vuldb.com/?submit.564729 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.568338 - () https://vuldb.com/?submit.568338 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.590559 - () https://vuldb.com/?submit.590559 - Third Party Advisory, VDB Entry
References () https://github.com/Pjwww13447/pjwww/issues/1 - Exploit, Third Party Advisory () https://github.com/Pjwww13447/pjwww/issues/1 - Exploit, Third Party Advisory, Issue Tracking

05 Jun 2025, 06:15

Type Values Removed Values Added
References
  • () https://vuldb.com/?submit.564729 -
  • () https://vuldb.com/?submit.568338 -
  • () https://vuldb.com/?submit.590559 -
Summary (en) A vulnerability was found in PHPGurukul Company Visitor Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /visitor-detail.php. The manipulation of the argument editid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. (en) A vulnerability was found in PHPGurukul Company Visitor Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /visitor-detail.php. The manipulation of the argument editid/remark leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

09 May 2025, 13:36

Type Values Removed Values Added
References () https://github.com/ctf2868/pjwww/issues/1 - () https://github.com/ctf2868/pjwww/issues/1 - Exploit, Third Party Advisory
References () https://phpgurukul.com/ - () https://phpgurukul.com/ - Product
References () https://vuldb.com/?ctiid.307436 - () https://vuldb.com/?ctiid.307436 - Permissions Required
References () https://vuldb.com/?id.307436 - () https://vuldb.com/?id.307436 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.564339 - () https://vuldb.com/?submit.564339 - Third Party Advisory, VDB Entry
References () https://github.com/Pjwww13447/pjwww/issues/1 - () https://github.com/Pjwww13447/pjwww/issues/1 - Exploit, Third Party Advisory
First Time Phpgurukul
Phpgurukul company Visitor Management System
CPE cpe:2.3:a:phpgurukul:company_visitor_management_system:2.0:*:*:*:*:*:*:*

06 May 2025, 14:15

Type Values Removed Values Added
References
  • () https://github.com/Pjwww13447/pjwww/issues/1 -
Summary
  • (es) Se encontró una vulnerabilidad en PHPGurukul Company Visitor Management System 2.0, clasificada como crítica. Este problema afecta a una funcionalidad desconocida del archivo /visitor-detail.php. La manipulación del argumento editid provoca una inyección SQL. El ataque puede ejecutarse remotamente. Se ha hecho público el exploit y puede que sea utilizado.

06 May 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-06 08:15

Updated : 2025-09-30 14:34


NVD link : CVE-2025-4332

Mitre link : CVE-2025-4332

CVE.ORG link : CVE-2025-4332


JSON object : View

Products Affected

phpgurukul

  • company_visitor_management_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')