First published: Wed Feb 12 2025(Updated: )
PHPGurukul Daily Expense Tracker System v1.1 is vulnerable to SQL Injection in /dets/add-expense.php via the costitem parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGurukul Daily Expense Tracker System | ||
PHPGurukul Daily Expense Tracker System | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25349 is classified as a high severity vulnerability due to the risk of unauthorized access to the database.
To fix CVE-2025-25349, sanitize user inputs and use prepared statements or parameterized queries in the /dets/add-expense.php file.
The impact of CVE-2025-25349 allows attackers to execute arbitrary SQL commands through the costitem parameter, potentially revealing sensitive information.
Only version 1.1 of the PHPGurukul Daily Expense Tracker System is affected by CVE-2025-25349.
There is currently no public information indicating that CVE-2025-25349 is being actively exploited in the wild.