Description
A vulnerability was found in PHPGurukul Online Shopping Portal Project 2.1. The impacted element is an unknown function of the file /payment-method.php of the component Parameter Handler. Performing a manipulation of the argument paymethod results in sql injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
Published: 2026-04-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A paymethod parameter in the payment-method.php component of the PHPGurukul Online Shopping Portal Project is not validated before being used in a SQL statement, creating an injectable point. This vulnerability is a classic example of SQL injection, where an attacker can alter database queries. The weakness is characterized by the CWE identifiers CWE‑74 (XSS with SQL injection) and CWE‑89 (SQL Injection). The exploitation of this flaw would allow a remote attacker to read, modify, or delete database records, thereby compromising confidentiality, integrity, and availability of the shopping portal.

Affected Systems

The issue is present in version 2.1 of the PHPGurukul Online Shopping Portal Project. The affected component is the Parameter Handler within payment‑method.php. No other product versions are listed in the CNA data.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote over the web, as attackers can manipulate the paymethod argument through HTTP requests. Exploitation requires that payment-method.php be publicly accessible and that the paymethod input is passed unsanitized into a database query. The public availability of a working exploit further raises the risk of successful attacks.

Generated by OpenCVE AI on April 5, 2026 at 13:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch or upgrade the PHPGurukul Online Shopping Portal Project to a version that has fixed the SQL injection flaw.
  • Sanitize and validate the paymethod parameter before using it in database queries; ensure it contains only expected values.
  • Refactor database interactions to use prepared statements or parameterized queries, preventing direct interpolation of user input.
  • Restrict access to payment-method.php to authenticated users only and enforce least‑privilege database permissions.
  • Monitor logs for abnormal query patterns or injection attempts and investigate suspicious activity promptly.

Generated by OpenCVE AI on April 5, 2026 at 13:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in PHPGurukul Online Shopping Portal Project 2.1. The impacted element is an unknown function of the file /payment-method.php of the component Parameter Handler. Performing a manipulation of the argument paymethod results in sql injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
Title PHPGurukul Online Shopping Portal Project Parameter payment-method.php sql injection
First Time appeared Phpgurukul
Phpgurukul online Shopping Portal Project
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:phpgurukul:online_shopping_portal_project:*:*:*:*:*:*:*:*
Vendors & Products Phpgurukul
Phpgurukul online Shopping Portal Project
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Phpgurukul Online Shopping Portal Project
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T02:49:00.648Z

Reserved: 2026-04-04T13:56:11.469Z

Link: CVE-2026-5560

cve-icon Vulnrichment

Updated: 2026-04-07T02:48:56.258Z

cve-icon NVD

Status : Deferred

Published: 2026-04-05T11:16:56.600

Modified: 2026-04-24T18:14:34.620

Link: CVE-2026-5560

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:56:53Z

Weaknesses