{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-5635","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-05T19:16:47.021Z","datePublished":"2026-04-06T07:45:10.545Z","dateUpdated":"2026-04-06T14:54:55.270Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-06T07:45:10.545Z"},"title":"PHPGurukul Online Shopping Portal Project Parameter categorywise-products.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"PHPGurukul","product":"Online Shopping Portal Project","versions":[{"version":"2.1","status":"affected"}],"cpes":["cpe:2.3:a:phpgurukul:online_shopping_portal_project:*:*:*:*:*:*:*:*"],"modules":["Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in PHPGurukul Online Shopping Portal Project 2.1. Affected by this issue is some unknown functionality of the file /categorywise-products.php of the component Parameter Handler. The manipulation of the argument cid results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-05T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-05T21:21:51.000Z","lang":"en","value":"VulDB entry last update"}],"references":[{"url":"https://vuldb.com/vuln/355423","name":"VDB-355423 | PHPGurukul Online Shopping Portal Project Parameter categorywise-products.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/355423/cti","name":"VDB-355423 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/785872","name":"Submit #785872 | PHPGurukul Online Shopping Portal Project 2.1 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/f1rstb100d/CVE/issues/15","tags":["exploit","issue-tracking"]},{"url":"https://phpgurukul.com/","tags":["product"]}],"tags":["x_freeware"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-06T14:54:45.745283Z","id":"CVE-2026-5635","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-06T14:54:55.270Z"}}]}}