Skip to main content

CVE-2025-6910: SQL Injection in PHPGurukul Student Record System

Medium
VulnerabilityCVE-2025-6910cvecve-2025-6910
Published: Mon Jun 30 2025 (06/30/2025, 14:02:06 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Student Record System

Description

A vulnerability was found in PHPGurukul Student Record System 3.2. It has been classified as critical. This affects an unknown part of the file /session.php. The manipulation of the argument session leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/30/2025, 14:24:40 UTC

Technical Analysis

CVE-2025-6910 is a SQL Injection vulnerability identified in version 3.2 of the PHPGurukul Student Record System, specifically within the /session.php file. The vulnerability arises from improper sanitization or validation of the 'session' argument, which allows an attacker to inject malicious SQL code remotely without requiring user interaction or authentication. This flaw enables an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of the application's normal operation. Although the CVSS 4.0 score is 5.3 (medium severity), the vulnerability is classified as critical in the description, indicating the potential for significant impact if exploited. The attack vector is network-based with low attack complexity and no privileges or user interaction needed, increasing the risk of exploitation. No known exploits are currently reported in the wild, and no official patches have been published yet. The vulnerability affects only version 3.2 of the Student Record System, which is used to manage student data, making educational institutions and related administrative bodies primary targets.

Potential Impact

For European organizations, particularly educational institutions, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive student records, including personal identification information, academic performance, and enrollment data. Exploitation could lead to unauthorized disclosure of personal data, violating GDPR regulations and resulting in legal and financial penalties. Additionally, attackers could alter or delete student records, disrupting administrative operations and undermining trust in the institution's data management. The availability of the system could also be affected if attackers use SQL Injection to cause database errors or crashes. Since the vulnerability can be exploited remotely without authentication, the attack surface is broad, increasing the likelihood of compromise. The medium CVSS score suggests moderate impact, but the critical classification and the nature of the data involved elevate the practical severity for European entities.

Mitigation Recommendations

Organizations using PHPGurukul Student Record System 3.2 should immediately conduct a thorough security review of the /session.php file and any code handling the 'session' parameter to implement proper input validation and parameterized queries or prepared statements to prevent SQL Injection. Until an official patch is released, deploying Web Application Firewalls (WAFs) with rules targeting SQL Injection patterns can help mitigate exploitation attempts. Regularly monitoring logs for suspicious database queries or unusual access patterns is advised. Additionally, restricting network access to the application to trusted IP ranges and enforcing strict access controls can reduce exposure. Organizations should also prepare incident response plans specific to data breaches involving student records and ensure backups are current and securely stored to enable recovery in case of data tampering or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-29T12:12:09.498Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68629a946f40f0eb728bd836

Added to database: 6/30/2025, 2:09:24 PM

Last enriched: 6/30/2025, 2:24:40 PM

Last updated: 8/11/2025, 1:44:06 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats