Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28323: n/a

0
Medium
VulnerabilityCVE-2024-28323cvecve-2024-28323
Published: Thu Mar 14 2024 (03/14/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

The bwdates-report-result.php file in Phpgurukul User Registration & Login and User Management System 3.1 contains a potential security vulnerability related to user input validation. The script retrieves user-provided date inputs without proper validation, making it susceptible to SQL injection attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:17:43 UTC

Technical Analysis

CVE-2024-28323 identifies a SQL injection vulnerability in the bwdates-report-result.php script within the Phpgurukul User Registration & Login and User Management System version 3.1. The vulnerability stems from improper validation of user-supplied date inputs, which are directly incorporated into SQL queries without sanitization or parameterization. This allows an attacker to craft malicious input that alters the intended SQL command, potentially enabling unauthorized data access or modification. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The CVSS 3.1 base score of 6.5 reflects that the attack vector is network-based with low attack complexity, no privileges required, and no user interaction needed. The impact affects confidentiality and integrity but not availability. No patches or known exploits are currently documented, but the presence of CWE-89 (SQL Injection) indicates a classic injection flaw. This vulnerability highlights the critical need for secure coding practices such as input validation, prepared statements, and least privilege database access in PHP-based web applications.

Potential Impact

If exploited, this vulnerability could allow attackers to access sensitive user data stored in the database, including potentially personal information managed by the user registration system. Attackers might also modify or delete data, undermining data integrity. While availability is not directly impacted, the breach of confidentiality and integrity could lead to reputational damage, regulatory penalties, and loss of user trust for affected organizations. Because no authentication is required, attackers can exploit this remotely, increasing the risk of widespread attacks if the system is exposed to the internet. Organizations relying on this software for user management or authentication may face increased risk of data breaches or unauthorized access incidents.

Mitigation Recommendations

Organizations should immediately audit the bwdates-report-result.php script and any other components handling user input for proper validation and sanitization. Implement parameterized queries or prepared statements to prevent SQL injection. Employ input validation to restrict date inputs to expected formats and ranges. Conduct code reviews and penetration testing focused on injection flaws. Restrict database user privileges to the minimum necessary to limit potential damage. Monitor logs for suspicious query patterns indicative of injection attempts. If possible, isolate or restrict access to the vulnerable system until patches or fixes are applied. Engage with the software vendor or community to obtain or develop patches. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting this endpoint.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d8db7ef31ef0b588545

Added to database: 2/25/2026, 9:45:49 PM

Last enriched: 2/26/2026, 11:17:43 AM

Last updated: 4/11/2026, 7:02:17 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses