First published: Thu May 01 2025(Updated: )
A vulnerability, which was classified as critical, has been found in PHPGurukul COVID19 Testing Management System 1.0. Affected by this issue is some unknown functionality of the file /login.php. The manipulation of the argument Username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGurukul COVID19 Testing Management System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4174 is classified as critical due to its potential for SQL injection vulnerabilities.
To fix CVE-2025-4174, sanitize and validate user inputs in the Username parameter of the /login.php file to prevent SQL injection.
CVE-2025-4174 affects PHPGurukul COVID19 Testing Management System version 1.0.
CVE-2025-4174 is an SQL injection vulnerability that can be exploited through improper handling of user input.
Yes, exploitation of CVE-2025-4174 can allow attackers to access sensitive data from the database.