{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-2372","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-03-16T13:18:30.956Z","datePublished":"2025-03-17T10:00:12.484Z","dateUpdated":"2025-03-17T12:29:26.444Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-03-17T10:00:12.484Z"},"title":"PHPGurukul Human Metapneumovirus Testing Management System Password Recovery Page password-recovery.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"PHPGurukul","product":"Human Metapneumovirus Testing Management System","versions":[{"version":"1.0","status":"affected"}],"modules":["Password Recovery Page"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. This affects an unknown part of the file /password-recovery.php of the component Password Recovery Page. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Es wurde eine Schwachstelle in PHPGurukul Human Metapneumovirus Testing Management System 1.0 entdeckt. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei /password-recovery.php der Komponente Password Recovery Page. Dank der Manipulation des Arguments username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-03-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-03-16T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-03-16T14:23:38.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"WenGui (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.299871","name":"VDB-299871 | PHPGurukul Human Metapneumovirus Testing Management System Password Recovery Page password-recovery.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.299871","name":"VDB-299871 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.515389","name":"Submit #515389 | PHPGurukul Human Metapneumovirus 1.0 https://github.com/SECWG/cve/issues/5","tags":["third-party-advisory"]},{"url":"https://github.com/SECWG/cve/issues/5","tags":["exploit","issue-tracking"]},{"url":"https://phpgurukul.com/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-17T12:29:19.955491Z","id":"CVE-2025-2372","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-17T12:29:26.444Z"}}]}}