Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-28832 | A vulnerability was identified in PHPGurukul User Management System 1.0. This vulnerability affects unknown code of the file /signup.php. Such manipulation of the argument emailid leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used. |
Fri, 22 Aug 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phpgurukul
Phpgurukul user Management System |
|
| CPEs | cpe:2.3:a:phpgurukul:user_management_system:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Phpgurukul
Phpgurukul user Management System |
Thu, 21 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 21 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in PHPGurukul User Management System 1.0. This vulnerability affects unknown code of the file /signup.php. Such manipulation of the argument emailid leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used. | |
| Title | PHPGurukul User Management System signup.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-08-21T14:24:04.582Z
Reserved: 2025-08-21T05:30:44.489Z
Link: CVE-2025-9302
Updated: 2025-08-21T14:23:54.227Z
Status : Analyzed
Published: 2025-08-21T14:15:44.383
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-9302
No data.
OpenCVE Enrichment
Updated: 2025-08-23T10:55:42Z
EUVD