{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-4873","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-05-16T19:37:14.198Z","datePublished":"2025-05-18T11:31:05.510Z","dateUpdated":"2025-05-19T14:18:21.507Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-05-18T11:31:05.510Z"},"title":"PHPGurukul News Portal Login index.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"PHPGurukul","product":"News Portal","versions":[{"version":"4.1","status":"affected"}],"modules":["Login"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in PHPGurukul News Portal 4.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/index.php of the component Login. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"In PHPGurukul News Portal 4.1 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Es geht um eine nicht näher bekannte Funktion der Datei /admin/index.php der Komponente Login. Durch das Manipulieren des Arguments Username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-05-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-05-16T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-05-16T21:42:17.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"-Schatten- (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.309415","name":"VDB-309415 | PHPGurukul News Portal Login index.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.309415","name":"VDB-309415 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.576244","name":"Submit #576244 | PHPGurukul News Portal Project 4.1 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/Schatten-42/MyCVE/issues/6","tags":["exploit","issue-tracking"]},{"url":"https://phpgurukul.com/","tags":["product"]}]},"adp":[{"references":[{"url":"https://github.com/Schatten-42/MyCVE/issues/6","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-19T14:18:19.049714Z","id":"CVE-2025-4873","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-19T14:18:21.507Z"}}]}}