. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is described as difficult. The exploit has been disclosed publicly and may be used.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 10 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:phpgurukul:news_portal:1.0:*:*:*:*:*:*:* |
Mon, 03 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phpgurukul
Phpgurukul news Portal |
|
| Vendors & Products |
Phpgurukul
Phpgurukul news Portal |
Mon, 03 Nov 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in PHPGurukul News Portal 1.0. The affected element is an unknown function of the file /onps/settings.py. Such manipulation of the argument SECRET_KEY leads to use of hard-coded cryptographic key . The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is described as difficult. The exploit has been disclosed publicly and may be used. | |
| Title | PHPGurukul News Portal settings.py hard-coded key | |
| Weaknesses | CWE-320 CWE-321 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-11-03T20:35:20.857Z
Reserved: 2025-11-02T13:12:28.220Z
Link: CVE-2025-12615
Updated: 2025-11-03T20:35:09.010Z
Status : Analyzed
Published: 2025-11-03T04:15:32.033
Modified: 2025-11-10T16:18:36.797
Link: CVE-2025-12615
No data.
OpenCVE Enrichment
Updated: 2025-11-03T10:43:26Z