Impact
The vulnerability resides in an unknown function within /admin/yesterday-reg-users.php of the PHPGurukul User Registration & Login and User Management System version 3.3. Manipulating the ID argument permits injection of arbitrary SQL statements, potentially allowing an attacker to read, modify, or delete database records. The CVE notes that remote exploitation is possible, indicating that a web request to the affected script can trigger the injection.
Affected Systems
All installations of PHPGurukul User Registration & Login and User Management System version 3.3 that expose the admin/yesterday-reg-users.php page to external users are at risk. The vendor is PHPGurukul, and no other product variants are listed as affected.
Risk and Exploitability
The CVSS score of 5.3 places this vulnerability in the medium severity range. EPSS data is not available, but the absence of an official patch and the presence of public exploitation code suggest that attackers can realistically target exposed systems. Because the attack vector is remote – an attacker can manipulate a URL parameter – the risk of exploitation is significant for publicly accessible deployments. The vulnerability is not cataloged in the CISA KEV list.
OpenCVE Enrichment