{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1160","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-18T20:26:45.323Z","datePublished":"2026-01-19T15:32:07.423Z","dateUpdated":"2026-02-23T08:47:15.683Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:47:15.683Z"},"title":"PHPGurukul Directory Management System Search index.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"PHPGurukul","product":"Directory Management System","versions":[{"version":"1.0","status":"affected"}],"cpes":["cpe:2.3:a:phpgurukul:directory_management_system:*:*:*:*:*:*:*:*"],"modules":["Search"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in PHPGurukul Directory Management System 1.0. Impacted is an unknown function of the file /index.php of the component Search. The manipulation of the argument searchdata leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-18T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-18T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-07T00:23:11.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Nick_1321 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.341754","name":"VDB-341754 | PHPGurukul Directory Management System Search index.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.341754","name":"VDB-341754 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.736333","name":"Submit #736333 | itsourcecode   Directory Management System  V1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/YouSeeYouOneDayDayDe/Nick_1321_vuls/issues/2","tags":["exploit","issue-tracking"]},{"url":"https://phpgurukul.com/","tags":["product"]}],"tags":["x_freeware"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-20T21:32:59.369453Z","id":"CVE-2026-1160","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-20T21:33:05.924Z"}}]}}