CVE-2025-4358

A vulnerability classified as critical has been found in PHPGurukul Company Visitor Management System 2.0. Affected is an unknown function of the file /admin-profile.php. The manipulation of the argument adminname/mobilenumber leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/Pjwww13447/pjwww/issues/2 Exploit Third Party Advisory
https://phpgurukul.com/ Product
https://vuldb.com/?ctiid.307476 Permissions Required
https://vuldb.com/?id.307476 Third Party Advisory VDB Entry
https://vuldb.com/?submit.564733 Third Party Advisory VDB Entry
https://github.com/Pjwww13447/pjwww/issues/2 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpgurukul:company_visitor_management_system:2.0:*:*:*:*:*:*:*

History

15 May 2025, 07:15

Type Values Removed Values Added
Summary (en) A vulnerability classified as critical has been found in PHPGurukul Company Visitor Management System 2.0. Affected is an unknown function of the file /admin-profile.php. The manipulation of the argument adminname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. (en) A vulnerability classified as critical has been found in PHPGurukul Company Visitor Management System 2.0. Affected is an unknown function of the file /admin-profile.php. The manipulation of the argument adminname/mobilenumber leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

09 May 2025, 13:35

Type Values Removed Values Added
CPE cpe:2.3:a:phpgurukul:company_visitor_management_system:2.0:*:*:*:*:*:*:*
First Time Phpgurukul
Phpgurukul company Visitor Management System
References () https://github.com/Pjwww13447/pjwww/issues/2 - () https://github.com/Pjwww13447/pjwww/issues/2 - Exploit, Third Party Advisory
References () https://phpgurukul.com/ - () https://phpgurukul.com/ - Product
References () https://vuldb.com/?ctiid.307476 - () https://vuldb.com/?ctiid.307476 - Permissions Required
References () https://vuldb.com/?id.307476 - () https://vuldb.com/?id.307476 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.564733 - () https://vuldb.com/?submit.564733 - Third Party Advisory, VDB Entry

07 May 2025, 14:13

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad crítica en PHPGurukul Company Visitor Management System 2.0. Se ve afectada una función desconocida del archivo /admin-profile.php. La manipulación del argumento adminname provoca una inyección SQL. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.

06 May 2025, 15:16

Type Values Removed Values Added
References () https://github.com/Pjwww13447/pjwww/issues/2 - () https://github.com/Pjwww13447/pjwww/issues/2 -

06 May 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-06 14:15

Updated : 2025-05-15 07:15


NVD link : CVE-2025-4358

Mitre link : CVE-2025-4358

CVE.ORG link : CVE-2025-4358


JSON object : View

Products Affected

phpgurukul

  • company_visitor_management_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')