Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 05 Apr 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in PHPGurukul Online Shopping Portal Project 2.1. The impacted element is an unknown function of the file /payment-method.php of the component Parameter Handler. Performing a manipulation of the argument paymethod results in sql injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. | |
| Title | PHPGurukul Online Shopping Portal Project Parameter payment-method.php sql injection | |
| First Time appeared |
Phpgurukul
Phpgurukul online Shopping Portal Project |
|
| Weaknesses | CWE-74 CWE-89 |
|
| CPEs | cpe:2.3:a:phpgurukul:online_shopping_portal_project:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Phpgurukul
Phpgurukul online Shopping Portal Project |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-07T02:49:00.648Z
Reserved: 2026-04-04T13:56:11.469Z
Link: CVE-2026-5560
Updated: 2026-04-07T02:48:56.258Z
Status : Deferred
Published: 2026-04-05T11:16:56.600
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-5560
No data.
OpenCVE Enrichment
Updated: 2026-04-06T21:56:53Z