Skip to main content

CVE-2025-6323: SQL Injection in PHPGurukul Pre-School Enrollment System

Medium
VulnerabilityCVE-2025-6323cvecve-2025-6323
Published: Fri Jun 20 2025 (06/20/2025, 09:00:19 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Pre-School Enrollment System

Description

A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0. It has been classified as critical. This affects an unknown part of the file /enrollment.php. The manipulation of the argument fathername leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

AI-Powered Analysis

AILast updated: 06/20/2025, 09:31:55 UTC

Technical Analysis

CVE-2025-6323 is a SQL Injection vulnerability identified in version 1.0 of the PHPGurukul Pre-School Enrollment System, specifically within the /enrollment.php file. The vulnerability arises from improper sanitization and validation of the 'fathername' parameter, which is directly used in SQL queries without adequate escaping or parameterization. This flaw allows an unauthenticated remote attacker to inject malicious SQL code, potentially manipulating the backend database. The injection can lead to unauthorized data access, modification, or deletion, compromising the confidentiality, integrity, and availability of the enrollment system's data. Although the exact extent of affected parameters beyond 'fathername' is unknown, the disclosure suggests other inputs might also be vulnerable. The vulnerability does not require user interaction or authentication, and the attack vector is network accessible. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with partial impact on confidentiality, integrity, and availability. No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation. The lack of available patches or mitigations from the vendor further elevates the urgency for organizations using this system to implement protective measures.

Potential Impact

For European organizations using the PHPGurukul Pre-School Enrollment System, this vulnerability poses a significant risk to the security of sensitive personal data, including children's and parents' information. Exploitation could lead to unauthorized disclosure of personal identifiable information (PII), violating GDPR requirements and potentially resulting in legal and financial penalties. Data integrity could be compromised, affecting enrollment records and operational reliability. Availability impacts could disrupt enrollment processes, causing administrative delays and reputational damage. Given the system's role in managing sensitive educational data, exploitation could also undermine trust in educational institutions. The medium CVSS score reflects a moderate but tangible risk, especially since no authentication or user interaction is required, making automated attacks feasible. Organizations in sectors with stringent data protection regulations and high public scrutiny, such as education and childcare services, are particularly vulnerable to the consequences of this vulnerability.

Mitigation Recommendations

1. Immediate implementation of web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'fathername' parameter and other input fields in /enrollment.php. 2. Conduct a thorough code review and refactor the enrollment system to use parameterized queries or prepared statements for all database interactions, eliminating direct concatenation of user inputs. 3. Apply input validation and sanitization on all user-supplied data, enforcing strict type and format checks before processing. 4. Monitor application logs for unusual query patterns or repeated failed attempts indicative of injection attempts. 5. If feasible, isolate the enrollment system in a segmented network zone with restricted database access to limit potential damage. 6. Engage with PHPGurukul for official patches or updates; if unavailable, consider migrating to alternative enrollment solutions with better security postures. 7. Educate administrative staff on recognizing signs of compromise and establish incident response protocols specific to database breaches. 8. Regularly back up enrollment data and verify backup integrity to enable recovery in case of data tampering or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-19T10:02:47.556Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685527027ff74dad36a21968

Added to database: 6/20/2025, 9:16:50 AM

Last enriched: 6/20/2025, 9:31:55 AM

Last updated: 8/18/2025, 11:33:55 PM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats