A SQL Injection vulnerability was found in /admin/edit-propertytype.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the editid GET request parameter.
References
Link | Resource |
---|---|
https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20p%20editid.pdf | Exploit Third Party Advisory |
Configurations
History
28 Mar 2025, 18:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20p%20editid.pdf - Exploit, Third Party Advisory | |
First Time |
Phpgurukul land Record System
Phpgurukul |
|
Summary |
|
|
CPE | cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:* |
13 Feb 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-89 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
13 Feb 2025, 17:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-13 17:17
Updated : 2025-03-28 18:35
NVD link : CVE-2025-25388
Mitre link : CVE-2025-25388
CVE.ORG link : CVE-2025-25388
JSON object : View
Products Affected
phpgurukul
- land_record_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')