{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-9831","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-09-02T12:24:35.531Z","datePublished":"2025-09-02T20:32:07.384Z","dateUpdated":"2025-09-02T20:49:21.498Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-09-02T20:32:07.384Z"},"title":"PHPGurukul Beauty Parlour Management System edit-services.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"PHPGurukul","product":"Beauty Parlour Management System","versions":[{"version":"1.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in PHPGurukul Beauty Parlour Management System 1.1. This impacts an unknown function of the file /admin/edit-services.php. This manipulation of the argument sername causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited."},{"lang":"de","value":"In PHPGurukul Beauty Parlour Management System 1.1 wurde eine Schwachstelle gefunden. Hierbei geht es um eine nicht exakt ausgemachte Funktion der Datei /admin/edit-services.php. Durch Beeinflussen des Arguments sername mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit ist öffentlich verfügbar und könnte genutzt werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-09-02T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-09-02T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-09-02T14:29:38.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"xiaoxin (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.322178","name":"VDB-322178 | PHPGurukul Beauty Parlour Management System edit-services.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.322178","name":"VDB-322178 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.642472","name":"Submit #642472 | PHPGurukul Beauty Parlour Management System V1.1 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/xiaoxinkaishi/cve/issues/2","tags":["exploit","issue-tracking"]},{"url":"https://phpgurukul.com/","tags":["product"]}],"tags":["x_freeware"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-02T20:48:59.321500Z","id":"CVE-2025-9831","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-02T20:49:21.498Z"}}]}}