Description
A flaw has been found in PHPGurukul PHPGurukul Online Shopping Portal Project up to 2.1. Impacted is an unknown function of the file /pending-orders.php of the component Parameter Handler. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Published: 2026-04-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection leading to unauthorized data access
Action: Immediate Patch
AI Analysis

Impact

A flaw in the Parameter Handler of the file pending-orders.php allows an attacker to manipulate the ID argument, resulting in a SQL injection opportunity. The vulnerability can be exploited remotely, enabling the attacker to read, modify, or delete sensitive data in the database, thereby compromising confidentiality and integrity. The weakness is categorized as CWE-74 and CWE-89, indicating an improper handling of user input within a SQL context.

Affected Systems

The affected product is the PHPGurukul Online Shopping Portal Project, versions up to 2.1. No newer versions were identified in the available data, so all installations of 2.1 or earlier are potentially vulnerable.

Risk and Exploitability

The CVSS score of 5.3 places this flaw at medium severity. The EPSS score is not available, and it is not listed in the CISA KEV catalog, but an exploit has already been published, indicating that the risk of exploitation is real. Attackers can remote trigger the injection via the ID parameter, suggesting a simple execution path without requiring privileged access. Given the medium score, the potential impact combined with public exploitation suggests prompt mitigation.

Generated by OpenCVE AI on April 5, 2026 at 13:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the PHPGurukul Online Shopping Portal Project to the latest release that addresses the SQL injection vulnerability
  • If an official update is unavailable, apply a patch that sanitizes or parameterises the ID input in pending-orders.php so that raw SQL is never executed
  • Deploy a Web Application Firewall or enforce strict database access controls to block malicious queries
  • Continuously monitor application and database logs for suspicious activity and apply security updates as soon as they are released

Generated by OpenCVE AI on April 5, 2026 at 13:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Phpgurukul
Phpgurukul online Shopping Portal Project
Vendors & Products Phpgurukul
Phpgurukul online Shopping Portal Project

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in PHPGurukul PHPGurukul Online Shopping Portal Project up to 2.1. Impacted is an unknown function of the file /pending-orders.php of the component Parameter Handler. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Title PHPGurukul PHPGurukul Online Shopping Portal Project Parameter pending-orders.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Phpgurukul Online Shopping Portal Project
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T17:53:39.954Z

Reserved: 2026-04-04T13:50:38.758Z

Link: CVE-2026-5558

cve-icon Vulnrichment

Updated: 2026-04-06T17:53:32.990Z

cve-icon NVD

Status : Deferred

Published: 2026-04-05T10:16:19.933

Modified: 2026-04-24T18:14:34.620

Link: CVE-2026-5558

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:56:55Z

Weaknesses