Impact
A security flaw exists in an unknown function of PHPGurukul News Portal 1.0 that accepts manipulated input and triggers cross‑site request forgery. An attacker can forge state‑changing requests from an authenticated user, allowing arbitrary data modification or privilege escalation. The weakness aligns with CWE‑352 and indicates that request integrity was not validated.
Affected Systems
The flaw affects PHPGurukul News Portal version 1.0, the only release identified in the advisory. The product is hosted on the PHPGurukul website and its source code is publicly available.
Risk and Exploitability
The CVSS base score is 5.3, indicating moderate risk. The EPSS score is below 1%, suggesting a low likelihood of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Remote exploitation is possible through web requests, so the attack vector is believed to be network.
OpenCVE Enrichment