{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-5641","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-05T20:31:06.845Z","datePublished":"2026-04-06T09:15:11.825Z","dateUpdated":"2026-04-06T14:49:24.340Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-06T09:15:11.825Z"},"title":"PHPGurukul Online Shopping Portal Project Parameter update-image1.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"PHPGurukul","product":"Online Shopping Portal Project","versions":[{"version":"2.1","status":"affected"}],"cpes":["cpe:2.3:a:phpgurukul:online_shopping_portal_project:*:*:*:*:*:*:*:*"],"modules":["Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in PHPGurukul Online Shopping Portal Project 2.1. The impacted element is an unknown function of the file /admin/update-image1.php of the component Parameter Handler. The manipulation of the argument filename results in sql injection. The attack may be performed from remote. The exploit has been made public and could be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-05T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-05T22:36:18.000Z","lang":"en","value":"VulDB entry last update"}],"references":[{"url":"https://vuldb.com/vuln/355429","name":"VDB-355429 | PHPGurukul Online Shopping Portal Project Parameter update-image1.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/355429/cti","name":"VDB-355429 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/785993","name":"Submit #785993 | PHPGurukul Online Shopping Portal Project 2.1 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/f1rstb100d/CVE/issues/19","tags":["exploit","issue-tracking"]},{"url":"https://phpgurukul.com/","tags":["product"]}],"tags":["x_freeware"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-06T14:33:45.761769Z","id":"CVE-2026-5641","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-06T14:49:24.340Z"}}]}}