First published: Thu Feb 13 2025(Updated: )
A SQL Injection vulnerability was found in /admin/bwdates-reports-details.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the " todate" POST request parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGurukul Land Record System | ||
PHPGurukul Land Record System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25356 is classified as a high severity SQL Injection vulnerability that allows unauthorized code execution.
To fix CVE-2025-25356, sanitize and validate the 'todate' POST request parameter to prevent SQL injection.
The vulnerability affects users of PHPGurukul Land Record System version 1.0 running on vulnerable web servers.
An attacker can exploit CVE-2025-25356 to execute arbitrary code on the server, potentially compromising the entire system.
Currently, there is no official patch released for CVE-2025-25356, so implementing proper input validation is essential.