First published: Thu May 01 2025(Updated: )
A vulnerability has been found in PHPGurukul Blood Bank & Donor Management System 2.4 and classified as critical. This vulnerability affects unknown code of the file /admin/request-received-bydonar.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Blood Bank & Donor Management System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4176 is classified as critical due to its potential for SQL injection vulnerabilities.
To fix CVE-2025-4176, sanitize and validate input to the 'searchdata' argument in the /admin/request-received-bydonar.php file.
CVE-2025-4176 affects PHPGurukul Blood Bank & Donor Management System version 2.4.
CVE-2025-4176 can lead to SQL injection attacks which may compromise the database.
A potential workaround for CVE-2025-4176 is to implement strong input validation and prepare SQL statements.