CVE-2025-10663: SQL Injection in PHPGurukul Online Course Registration
A vulnerability was found in PHPGurukul Online Course Registration 3.1. This affects an unknown function of the file /my-profile.php. Performing manipulation of the argument cgpa results in sql injection. The attack may be initiated remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-10663 is a SQL Injection vulnerability identified in version 3.1 of the PHPGurukul Online Course Registration system, specifically within the /my-profile.php file. The vulnerability arises from improper sanitization or validation of the 'cgpa' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database without any user interaction or privileges. The vulnerability is classified with a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, low attack complexity, no required privileges or user interaction, and limited impact on confidentiality, integrity, and availability. Exploiting this vulnerability could enable attackers to read, modify, or delete sensitive data stored in the database, potentially leading to data leakage, unauthorized data modification, or disruption of service. Although no public exploits are currently known in the wild, the exploit code has been made publicly available, increasing the risk of exploitation. The vulnerability affects only version 3.1 of the product, and no official patches or mitigation guidance have been published by the vendor at this time.
Potential Impact
For European organizations using PHPGurukul Online Course Registration version 3.1, this vulnerability poses a significant risk to the confidentiality and integrity of student and course-related data. Educational institutions and training providers could face unauthorized disclosure of personal information, academic records, and enrollment details. Data tampering could undermine the trustworthiness of academic records and disrupt administrative processes. Additionally, successful exploitation could lead to denial of service or further compromise of the underlying infrastructure if attackers leverage the database access for lateral movement. Given the remote, unauthenticated nature of the attack, the threat surface is broad, and organizations lacking timely mitigation are vulnerable to automated scanning and exploitation attempts. The reputational damage and potential regulatory consequences under GDPR for data breaches further amplify the impact on European entities.
Mitigation Recommendations
Organizations should immediately assess their deployment of PHPGurukul Online Course Registration and identify any instances running version 3.1. As no official patch is currently available, the following specific mitigations are recommended: 1) Implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection payloads targeting the 'cgpa' parameter, focusing on common SQL injection patterns. 2) Employ input validation and sanitization at the application or proxy level to restrict 'cgpa' parameter inputs to expected numeric or formatted values. 3) Restrict database user permissions to the minimum necessary, avoiding use of highly privileged accounts by the web application to limit potential damage. 4) Monitor database logs and web server logs for unusual queries or error messages indicative of injection attempts. 5) Plan and prioritize upgrading or patching the PHPGurukul Online Course Registration system once vendor updates become available. 6) Conduct security awareness and incident response readiness for potential exploitation scenarios. These targeted measures go beyond generic advice by focusing on the specific vulnerable parameter and the operational context of the affected product.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-10663: SQL Injection in PHPGurukul Online Course Registration
Description
A vulnerability was found in PHPGurukul Online Course Registration 3.1. This affects an unknown function of the file /my-profile.php. Performing manipulation of the argument cgpa results in sql injection. The attack may be initiated remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10663 is a SQL Injection vulnerability identified in version 3.1 of the PHPGurukul Online Course Registration system, specifically within the /my-profile.php file. The vulnerability arises from improper sanitization or validation of the 'cgpa' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database without any user interaction or privileges. The vulnerability is classified with a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, low attack complexity, no required privileges or user interaction, and limited impact on confidentiality, integrity, and availability. Exploiting this vulnerability could enable attackers to read, modify, or delete sensitive data stored in the database, potentially leading to data leakage, unauthorized data modification, or disruption of service. Although no public exploits are currently known in the wild, the exploit code has been made publicly available, increasing the risk of exploitation. The vulnerability affects only version 3.1 of the product, and no official patches or mitigation guidance have been published by the vendor at this time.
Potential Impact
For European organizations using PHPGurukul Online Course Registration version 3.1, this vulnerability poses a significant risk to the confidentiality and integrity of student and course-related data. Educational institutions and training providers could face unauthorized disclosure of personal information, academic records, and enrollment details. Data tampering could undermine the trustworthiness of academic records and disrupt administrative processes. Additionally, successful exploitation could lead to denial of service or further compromise of the underlying infrastructure if attackers leverage the database access for lateral movement. Given the remote, unauthenticated nature of the attack, the threat surface is broad, and organizations lacking timely mitigation are vulnerable to automated scanning and exploitation attempts. The reputational damage and potential regulatory consequences under GDPR for data breaches further amplify the impact on European entities.
Mitigation Recommendations
Organizations should immediately assess their deployment of PHPGurukul Online Course Registration and identify any instances running version 3.1. As no official patch is currently available, the following specific mitigations are recommended: 1) Implement Web Application Firewall (WAF) rules to detect and block suspicious SQL injection payloads targeting the 'cgpa' parameter, focusing on common SQL injection patterns. 2) Employ input validation and sanitization at the application or proxy level to restrict 'cgpa' parameter inputs to expected numeric or formatted values. 3) Restrict database user permissions to the minimum necessary, avoiding use of highly privileged accounts by the web application to limit potential damage. 4) Monitor database logs and web server logs for unusual queries or error messages indicative of injection attempts. 5) Plan and prioritize upgrading or patching the PHPGurukul Online Course Registration system once vendor updates become available. 6) Conduct security awareness and incident response readiness for potential exploitation scenarios. These targeted measures go beyond generic advice by focusing on the specific vulnerable parameter and the operational context of the affected product.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-18T05:20:40.494Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cbe8acaf984949a8d1d413
Added to database: 9/18/2025, 11:10:36 AM
Last enriched: 9/18/2025, 11:10:54 AM
Last updated: 9/18/2025, 11:13:47 AM
Views: 2
Related Threats
CVE-2025-10665: SQL Injection in kidaze CourseSelectionSystem
MediumCVE-2025-10664: SQL Injection in PHPGurukul Small CRM
MediumCVE-2025-40678: CWE-434 Unrestricted Upload of File with Dangerous Type in Summar Software Portal del Empleado
MediumCVE-2025-40677: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Summar Software Portal del Empleado
HighCVE-2025-9083: CWE-502 Deserialization of Untrusted Data in Ninja Forms
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.