CVE-2025-6323

| EUVD-2025-18773 HIGH
2025-06-20 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
EUVD ID Assigned
Mar 15, 2026 - 00:19 euvd
EUVD-2025-18773
Analysis Generated
Mar 15, 2026 - 00:19 vuln.today
PoC Detected
Jun 26, 2025 - 18:51 vuln.today
Public exploit code
CVE Published
Jun 20, 2025 - 09:15 nvd
HIGH 7.3

Description

A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0. It has been classified as critical. This affects an unknown part of the file /enrollment.php. The manipulation of the argument fathername leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Analysis

CVE-2025-6323 is a critical SQL injection vulnerability in PHPGurukul Pre-School Enrollment System version 1.0, specifically affecting the /enrollment.php file's 'fathername' parameter. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion of the enrollment database. The vulnerability has public proof-of-concept code available and may be actively exploited in the wild.

Technical Context

This vulnerability stems from CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), which is the parent class for SQL injection flaws. The affected application is a PHP-based enrollment management system (CPE: cpe:2.3:a:phpgurukul:pre-school_enrollment_system:1.0) that fails to sanitize or parameterize user-supplied input in the 'fathername' parameter before incorporating it into SQL queries. The vulnerability is present in /enrollment.php, indicating insufficient input validation at the application tier. The attack exploits the lack of prepared statements or parameterized queries, allowing attackers to inject malicious SQL syntax through the HTTP request.

Affected Products

Pre-School Enrollment System (['1.0'])

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-6323 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy