First published: Fri Mar 07 2025(Updated: )
A vulnerability was found in PHPGurukul Online Library Management System 3.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /change-password.php. The manipulation of the argument email/phone number leads to weak password recovery. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Online Library Management System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2093 has been declared as problematic, indicating a significant security risk.
To fix CVE-2025-2093, it is recommended to update the PHPGurukul Online Library Management System to a patched version that addresses the vulnerability.
CVE-2025-2093 affects the password change functionality in the /change-password.php file of the system.
The vulnerability in CVE-2025-2093 occurs through manipulation of the email or phone number argument.
Users of the PHPGurukul Online Library Management System version 3.0 are impacted by CVE-2025-2093.