Description
A vulnerability was identified in PHPGurukul News Portal 1.0. This affects an unknown part of the component Profile Pic Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Published: 2026-01-26
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted File Upload
Action: Apply Fix
AI Analysis

Impact

A vulnerability in PHPGurukul News Portal 1.0 allows users to upload arbitrary files through the Profile Pic Handler. The upload process does not enforce file type validation or access controls. Based on the description, it is inferred that uploading a malicious file such as a web shell or executable could lead to remote code execution if the server executes such files. The flaw is an unrestricted upload that ignores file type validation.

Affected Systems

The affected product is PHPGurukul News Portal version 1.0. No additional affected components or versions were disclosed beyond the Entry version listed in the CPE strings.

Risk and Exploitability

The CVSS score of 5.1 indicates a moderate severity. The EPSS score of less than 1% suggests a low probability of immediate exploitation, and the vulnerability is not listed in the CISA KEV catalog. However, the description confirms that the exploit is publicly available and can be initiated remotely. Attackers can exploit the flaw by crafting a multipart request that uploads a file with an allowed extension or MIME type but containing payload code. Based on the description, it is inferred that if the web server permits execution of files in the upload directory, remote code execution could be possible. The risk is limited to systems running the unpatched PHPGurukul News Portal 1.0 where the upload directory is accessible to attackers.

Generated by OpenCVE AI on April 18, 2026 at 15:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to a patched version of PHPGurukul News Portal if one is available
  • Restrict profile picture uploads to only approved image types and validate MIME types before accepting the file
  • Place the upload directory outside the web root or configure the web server to disallow execution of files stored there

Generated by OpenCVE AI on April 18, 2026 at 15:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:phpgurukul:news_portal:*:*:*:*:*:*:*:*

Tue, 27 Jan 2026 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:phpgurukul:news_portal:1.0:*:*:*:*:*:*:*

Tue, 27 Jan 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Phpgurukul
Phpgurukul news Portal
Vendors & Products Phpgurukul
Phpgurukul news Portal

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 07:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in PHPGurukul News Portal 1.0. This affects an unknown part of the component Profile Pic Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
Title PHPGurukul News Portal Profile Pic unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Phpgurukul News Portal
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:57:53.045Z

Reserved: 2026-01-25T17:14:42.023Z

Link: CVE-2026-1424

cve-icon Vulnrichment

Updated: 2026-01-26T14:21:53.707Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-26T07:16:08.063

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1424

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:15:03Z

Weaknesses