First published: Tue Apr 29 2025(Updated: )
A vulnerability has been found in PHPGurukul COVID19 Testing Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /test-details.php. The manipulation of the argument Status leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGurukul COVID19 Testing Management System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4071 is classified as a critical severity vulnerability.
CVE-2025-4071 exploits SQL injection through manipulation of the Status parameter in the /test-details.php file.
CVE-2025-4071 affects users of PHPGurukul COVID19 Testing Management System version 1.0.
Yes, CVE-2025-4071 can be initiated remotely by attackers.
The vulnerable file in CVE-2025-4071 is /test-details.php.