Description
phpgurukul Complaint Management System in PHP 2.0 is vulnerable to SQL Injection in user/reset-password.php via the mobileno parameter.
Published: 2025-09-03
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The Complaint Management System built in PHP 2.0 contains a failure to sanitize the mobileno parameter in the reset-password.php script. This omission allows attackers to inject arbitrary SQL commands into the request. An attacker who succeeds could read, modify, or delete data in the underlying database, reset users’ passwords, or even gain unauthorized database access. The vulnerability is an instance of injection (CWE‑89) and could compromise confidentiality, integrity, and availability of the system’s data.

Affected Systems

Vendor phpGurukul, Product Complaint Management System version 2.0, specifically the reset-password.php component accessed via the user/reset-password.php URL.

Risk and Exploitability

The CVSS score of 8.1 denotes a high severity threat, while the EPSS score of less than 1% indicates a very low probability of exploitation under current conditions. The vulnerability is not listed in CISA’s KEV catalog, but the lack of a mitigation in the code means it can be exploited if an attacker can reach the reset-password endpoint. The likely attack vector is remote over the web, requiring only an unauthenticated HTTP request with a crafted mobileno value.

Generated by OpenCVE AI on April 22, 2026 at 22:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Contact the vendor to obtain a patch that fixes the injection in reset-password.php and apply it as soon as possible.
  • If a vendor patch is not yet available, limit access to the reset-password functionality by IP address or internal network and require additional authentication before password reset can proceed.
  • Redesign the mobileno handling in reset-password.php to use a prepared statement or parameterized query and validate the mobile number against a strict regex pattern to ensure only legitimate values are accepted.

Generated by OpenCVE AI on April 22, 2026 at 22:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-26523 phpgurukul Complaint Management System in PHP 2.0 is vulnerable to SQL Injection in user/reset-password.php via the mobileno parameter.
History

Wed, 22 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
Title SQL Injection via mobileno in reset‑password functionality of Complaint Management System

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
References

Mon, 08 Sep 2025 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:phpgurukul:complaint_management_system:2.0:*:*:*:-:*:*:*

Thu, 04 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 3.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}


Wed, 03 Sep 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Phpgurukul
Phpgurukul complaint Management System
Vendors & Products Phpgurukul
Phpgurukul complaint Management System

Wed, 03 Sep 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 3.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 03 Sep 2025 15:00:00 +0000

Type Values Removed Values Added
Description phpgurukul Complaint Management System in PHP 2.0 is vulnerable to SQL Injection in user/reset-password.php via the mobileno parameter.
References

Subscriptions

Phpgurukul Complaint Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-06T14:04:43.136Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-57146

cve-icon Vulnrichment

Updated: 2025-09-03T16:26:21.493Z

cve-icon NVD

Status : Modified

Published: 2025-09-03T15:15:38.403

Modified: 2026-04-06T15:17:05.640

Link: CVE-2025-57146

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T22:30:28Z

Weaknesses