Skip to main content

CVE-2025-10025: SQL Injection in PHPGurukul Online Course Registration

Medium
VulnerabilityCVE-2025-10025cvecve-2025-10025
Published: Fri Sep 05 2025 (09/05/2025, 19:32:08 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Online Course Registration

Description

A vulnerability has been found in PHPGurukul Online Course Registration 3.1. Affected is an unknown function of the file /admin/semester.php. The manipulation of the argument semester leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 09/05/2025, 19:48:23 UTC

Technical Analysis

CVE-2025-10025 is a SQL Injection vulnerability identified in version 3.1 of the PHPGurukul Online Course Registration system, specifically within an unknown function in the /admin/semester.php file. The vulnerability arises from improper sanitization or validation of the 'semester' parameter, which is directly used in SQL queries. This flaw allows an unauthenticated remote attacker to inject arbitrary SQL code by manipulating the 'semester' argument, potentially leading to unauthorized data access or modification. The vulnerability does not require any user interaction or privileges to exploit, and the attack vector is network-based, making it accessible remotely. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation (low attack complexity), no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability (low to limited impact). Although no known exploits are reported in the wild yet, the public disclosure of the vulnerability and exploit details increases the risk of exploitation. The vulnerability affects only version 3.1 of the PHPGurukul Online Course Registration system, which is a niche product used primarily in educational institutions for managing course registrations online. The lack of a patch at the time of disclosure further elevates the risk for organizations using this software.

Potential Impact

For European organizations, particularly educational institutions such as universities and colleges that utilize PHPGurukul Online Course Registration version 3.1, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized access to sensitive student and academic data, including enrollment information, personal identifiers, and potentially administrative credentials. This could result in data breaches, privacy violations under GDPR, and disruption of academic operations. Although the impact on system availability is limited, data integrity and confidentiality could be compromised, leading to reputational damage and regulatory penalties. The remote, unauthenticated nature of the vulnerability increases the threat surface, especially for institutions with internet-facing administrative portals. Given the specialized nature of the product, the impact is concentrated but critical for affected organizations.

Mitigation Recommendations

Organizations should immediately audit their use of PHPGurukul Online Course Registration software to determine if version 3.1 is deployed. If so, they should implement the following specific mitigations: 1) Apply any available patches or updates from PHPGurukul as soon as they are released. 2) In the absence of patches, implement web application firewall (WAF) rules to detect and block SQL injection attempts targeting the 'semester' parameter in /admin/semester.php. 3) Restrict access to the /admin directory to trusted IP addresses or via VPN to reduce exposure. 4) Conduct code reviews and sanitize all inputs rigorously, especially the 'semester' parameter, using parameterized queries or prepared statements to prevent injection. 5) Monitor logs for suspicious activity related to SQL injection patterns. 6) Educate administrative users about the risk and encourage strong authentication and monitoring. 7) Consider isolating or temporarily disabling the vulnerable module if immediate patching is not feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-05T13:00:46.493Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68bb3e77e50436161e29a02f

Added to database: 9/5/2025, 7:48:07 PM

Last enriched: 9/5/2025, 7:48:23 PM

Last updated: 9/5/2025, 8:58:27 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats