Description
A vulnerability was found in PHPGurukul Online Course Registration System up to 3.1. This affects an unknown part of the file /enroll.php. The manipulation of the argument studentregno/Pincode/session/department/level/course/sem results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.
Published: 2026-01-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized data access and modification via SQL injection
Action: Apply Patch
AI Analysis

Impact

A flaw exists in the PHPGurukul Online Course Registration System in the file /enroll.php that allows an attacker to manipulate the request arguments—studentregno, Pincode, session, department, level, course, and sem—to inject arbitrary SQL statements. The injection can be triggered remotely by sending a crafted HTTP request to the vulnerable endpoint. Once exploited, the attacker can read, modify, or delete database records, potentially exposing sensitive student information or compromising the integrity of the registration system.

Affected Systems

The vulnerability affects PHPGurukul’s Online Course Registration System versions up to and including 3.1. No later versions are mentioned as receiving the fix. System administrators should verify whether their deployment is within the affected release range.

Risk and Exploitability

With a CVSS score of 5.3, this issue falls into the medium severity range. The EPSS score is below 1 % indicating a low probability of exploitation under current data. The vulnerability is not listed in the CISA KEV catalog. Although the attack vector is remote, it requires only that the attacker is able to send HTTP requests to the vulnerable server, making the exposure significant for publicly reachable installations. Successful injection could lead to data leakage or unauthorized data manipulation.

Generated by OpenCVE AI on April 18, 2026 at 07:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check with the vendor for a patch or newer release that addresses the SQL injection in enroll.php.
  • Implement input validation and switch to parameterized SQL queries for all request parameters handled by enroll.php to eliminate injection risk.
  • Configure firewall or web access controls to restrict who can reach the enrollment endpoint, limiting the attack surface to trusted internal networks only.

Generated by OpenCVE AI on April 18, 2026 at 07:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 22 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:phpgurukul:online_course_registration_system:*:*:*:*:*:*:*:*

Mon, 12 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Phpgurukul
Phpgurukul online Course Registration System
Vendors & Products Phpgurukul
Phpgurukul online Course Registration System

Fri, 09 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 15:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in PHPGurukul Online Course Registration System up to 3.1. This affects an unknown part of the file /enroll.php. The manipulation of the argument studentregno/Pincode/session/department/level/course/sem results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.
Title PHPGurukul Online Course Registration System enroll.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Phpgurukul Online Course Registration System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:25:26.551Z

Reserved: 2026-01-09T09:41:52.701Z

Link: CVE-2026-0803

cve-icon Vulnrichment

Updated: 2026-01-09T16:24:19.580Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-09T16:16:07.840

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-0803

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T07:30:36Z

Weaknesses