Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0547: Unrestricted Upload in PHPGurukul Online Course Registration

0
Medium
VulnerabilityCVE-2026-0547cvecve-2026-0547
Published: Fri Jan 02 2026 (01/02/2026, 09:32:07 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Online Course Registration

Description

A vulnerability was found in PHPGurukul Online Course Registration up to 3.1. This issue affects some unknown processing of the file /admin/edit-student-profile.php of the component Student Registration Page. The manipulation of the argument photo results in unrestricted upload. The attack may be launched remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 01/09/2026, 11:00:37 UTC

Technical Analysis

CVE-2026-0547 is a vulnerability identified in PHPGurukul Online Course Registration software versions 3.0 and 3.1, specifically within the /admin/edit-student-profile.php file handling the 'photo' parameter. The flaw allows an attacker to perform unrestricted file uploads due to insufficient validation or sanitization of the uploaded file. This vulnerability can be exploited remotely by an attacker with limited privileges (PR:L) without requiring user interaction (UI:N) or authentication beyond limited rights. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the attack vector is network-based (AV:N), with low attack complexity (AC:L), and no privileges required beyond limited user rights. The vulnerability could enable attackers to upload malicious files such as web shells or scripts, leading to remote code execution, data leakage, or defacement. The lack of scope change (S:U) indicates the impact is confined to the vulnerable component but still affects confidentiality, integrity, and availability at a low level. No patches are currently linked, and no known exploits are active in the wild, but the public disclosure of the exploit code increases the risk of future attacks. This vulnerability is particularly critical in educational environments where the software is used to manage student data and profiles, potentially exposing sensitive information or allowing attackers to pivot within the network.

Potential Impact

For European organizations, especially educational institutions using PHPGurukul Online Course Registration, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized access to student records, manipulation of academic data, or deployment of malicious payloads within the network. This could result in data breaches violating GDPR regulations, reputational damage, and operational disruptions. Attackers might leverage the uploaded files to establish persistent access or move laterally within the organization's infrastructure. Given the remote exploitability and low complexity, attackers can easily target multiple institutions simultaneously. The impact extends beyond confidentiality to integrity and availability, potentially affecting the trustworthiness of academic records and the availability of registration services. Organizations relying on this software without adequate compensating controls are at heightened risk of compliance violations and financial penalties.

Mitigation Recommendations

Immediate mitigation steps include restricting file upload permissions to only trusted users and implementing strict server-side validation of uploaded files, including checking file types, sizes, and content signatures. Employing allowlists for acceptable file extensions and scanning uploads with antivirus or malware detection tools is critical. Organizations should monitor web server logs for suspicious upload attempts and anomalous file creations. Network segmentation can limit the impact of a successful exploit by isolating the application server from sensitive backend systems. Until official patches are released, consider disabling the photo upload feature or replacing it with a safer alternative. Regularly update and audit the PHPGurukul software and underlying web server configurations. Implement web application firewalls (WAFs) with rules to detect and block malicious upload patterns. Educate administrators about the vulnerability and enforce the principle of least privilege for user accounts managing uploads.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T13:21:45.563Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69579353db813ff03edc3e3a

Added to database: 1/2/2026, 9:43:47 AM

Last enriched: 1/9/2026, 11:00:37 AM

Last updated: 2/7/2026, 7:42:44 AM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats