CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4DescriptionNVD
A vulnerability was found in PHPGurukul Curfew e-Pass Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/view-pass-detail.php. The manipulation of the argument viewid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AnalysisAI
Critical SQL injection vulnerability in PHPGurukul Curfew e-Pass Management System version 1.0, specifically in the /admin/view-pass-detail.php file where the 'viewid' parameter is not properly sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or denial of service. The vulnerability has been publicly disclosed with proof-of-concept code available, making it actively exploitable in the wild.
Technical ContextAI
This vulnerability stems from improper input validation in a PHP web application, classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component). The root cause is the failure to implement parameterized queries or proper input sanitization on the 'viewid' parameter before it is incorporated into SQL statements. The affected product is PHPGurukul Curfew e-Pass Management System 1.0, a PHP-based web application designed for managing student curfew passes and access control. The vulnerability exists in an administrative interface endpoint that lacks proper authentication checks, allowing unauthenticated SQL injection attacks. The underlying issue reflects a common PHP vulnerability pattern where user-supplied input is directly concatenated into SQL queries without using prepared statements or ORM frameworks that would prevent such attacks.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-16838