Description
A security vulnerability has been detected in PHPGurukul Directory Management System 1.0. Impacted is an unknown function of the file /index.php of the component Search. The manipulation of the argument searchdata leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-01-19
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Compromise via SQL Injection
Action: Patch Immediately
AI Analysis

Impact

A flaw in the Search module of PHPGurukul Directory Management System allows a malicious actor to insert arbitrary SQL statements through the searchdata parameter in /index.php. The injected SQL can expose, alter, or delete database contents, potentially allowing unauthorized access to sensitive user data or modification of system records. The flaw does not directly grant code execution, but the ability to manipulate data can lead to significant business impact and credential misuse.

Affected Systems

The vulnerability affects PHPGurukul Directory Management System version 1.0. The exposed code resides in the Search component of the index.php file. No other product versions are listed as affected.

Risk and Exploitability

The CVSS score of 6.9 reflects a moderate to high severity, and the EPSS score of < 1% indicates a low probability of exploitation at present. The flaw is not listed in the known exploited vulnerabilities catalog, but the attack can be triggered remotely via HTTP requests to the vulnerable endpoint. Because the public exploit has been disclosed, an attacker could craft a payload to retrieve or tamper with data if the vulnerable system is exposed to the internet.

Generated by OpenCVE AI on April 18, 2026 at 05:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update PHPGurukul Directory Management System to a patched version if one is released by the vendor.
  • If no patch is available, refactor the Search module to use prepared statements or parameterized queries, ensuring that input from searchdata is strictly sanitized.
  • Limit access to the Search functionality to authenticated users only, and implement logging and monitoring to detect suspicious query activity.

Generated by OpenCVE AI on April 18, 2026 at 05:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:phpgurukul:directory_management_system:*:*:*:*:*:*:*:*

Fri, 06 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:phpgurukul:directory_management_system:1.0:*:*:*:*:*:*:*

Tue, 20 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Phpgurukul
Phpgurukul directory Management System
Vendors & Products Phpgurukul
Phpgurukul directory Management System

Mon, 19 Jan 2026 15:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in PHPGurukul Directory Management System 1.0. Impacted is an unknown function of the file /index.php of the component Search. The manipulation of the argument searchdata leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Title PHPGurukul Directory Management System Search index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Phpgurukul Directory Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:47:15.683Z

Reserved: 2026-01-18T20:26:45.323Z

Link: CVE-2026-1160

cve-icon Vulnrichment

Updated: 2026-01-20T21:33:03.426Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T16:15:53.953

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1160

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:15:15Z

Weaknesses