Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0547: Unrestricted Upload in PHPGurukul Online Course Registration

0
Medium
VulnerabilityCVE-2026-0547cvecve-2026-0547
Published: Fri Jan 02 2026 (01/02/2026, 09:32:07 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Online Course Registration

Description

A vulnerability was found in PHPGurukul Online Course Registration up to 3.1. This issue affects some unknown processing of the file /admin/edit-student-profile.php of the component Student Registration Page. The manipulation of the argument photo results in unrestricted upload. The attack may be launched remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 01/02/2026, 09:58:57 UTC

Technical Analysis

CVE-2026-0547 is a vulnerability identified in PHPGurukul Online Course Registration software versions 3.0 and 3.1, specifically within the /admin/edit-student-profile.php file handling the 'photo' parameter. The flaw allows an attacker with limited privileges (PR:L) to perform an unrestricted file upload remotely (AV:N), without requiring user interaction (UI:N). The vulnerability arises from insufficient validation or sanitization of the uploaded file, enabling an attacker to upload malicious files such as web shells or scripts. This can lead to unauthorized code execution, data leakage, or defacement of the web application. The CVSS 4.0 vector indicates low complexity (AC:L), no authentication bypass (AT:N), and limited impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of attacks. The vulnerability affects the Student Registration Page component, which is likely accessible to users with some administrative or student profile editing privileges, making it a significant risk if access controls are weak. The lack of patch links suggests that vendors or maintainers have not yet released an official fix, emphasizing the need for immediate mitigation strategies.

Potential Impact

For European organizations, particularly educational institutions using PHPGurukul Online Course Registration software, this vulnerability poses a risk of unauthorized file uploads leading to server compromise. Attackers could deploy web shells or malware, resulting in data breaches, defacement, or disruption of services. The impact extends to confidentiality (exposure of student data), integrity (modification of records or system files), and availability (service outages due to malicious payloads). Given the remote exploitability and no requirement for user interaction, attackers can automate exploitation attempts, increasing risk. The medium severity suggests moderate but tangible risk, especially where the software is deployed in critical academic environments. Additionally, compliance with GDPR and other data protection regulations could be jeopardized if personal data is exposed or manipulated. The absence of patches means organizations must rely on compensating controls, increasing operational overhead and risk exposure until remediation is available.

Mitigation Recommendations

Organizations should immediately implement strict server-side validation of all uploaded files in the /admin/edit-student-profile.php component, ensuring only allowed file types (e.g., JPEG, PNG) are accepted and verifying file headers and MIME types. Employ file size limits and rename uploaded files to prevent execution of malicious scripts. Restrict upload functionality to trusted, authenticated users with minimal necessary privileges and enforce strong access controls on the administration interface. Use web application firewalls (WAFs) to detect and block suspicious upload attempts. Monitor logs for unusual activity related to file uploads and conduct regular security audits of the affected application components. If possible, isolate the upload directory from executable permissions to prevent execution of uploaded files. Engage with the vendor or community to obtain patches or updates and apply them promptly once available. Additionally, consider deploying runtime application self-protection (RASP) solutions to detect exploitation attempts in real time.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T13:21:45.563Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69579353db813ff03edc3e3a

Added to database: 1/2/2026, 9:43:47 AM

Last enriched: 1/2/2026, 9:58:57 AM

Last updated: 1/8/2026, 7:22:46 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats