First published: Fri Apr 04 2025(Updated: )
A vulnerability was found in PHPGurukul e-Diary Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /registration.php. The manipulation of the argument emailid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGurukul e-Diary Management System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3217 has been declared as critical due to its potential for remote SQL injection attacks.
To mitigate CVE-2025-3217, ensure input validation and parameterized queries in the /registration.php file.
CVE-2025-3217 allows attackers to execute arbitrary SQL commands through the emailid parameter, compromising the database.
Yes, CVE-2025-3217 can be exploited remotely, making it a significant threat to users of the affected system.
CVE-2025-3217 affects version 1.0 of the PHPGurukul e-Diary Management System.