Impact
A vulnerability exists in PHPGurukul Online Course Registration 3.1 that permits injection of arbitrary SQL through the cid parameter in the /check_availability.php file. This flaw enables an attacker to execute unauthorized database queries, potentially exposing, modifying, or deleting sensitive data. The weakness aligns with classic SQL injection (CWE-89) and can be abused remotely.
Affected Systems
PHPGurukul Online Course Registration version 3.1 is affected by the SQL injection flaw. The vulnerability originates from code in the /check_availability.php endpoint, and any deployment using this component is at risk. No other versions or products are explicitly listed as impacted.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity, while the EPSS score is not available and the vulnerability is not listed in the KEV catalog. An attacker can exploit the flaw remotely by manipulating the cid argument, and public proof‑of‑concept exploits are available. Given the remote nature and lack of restriction on the parameter, the risk of exploitation remains significant for exposed installations.
OpenCVE Enrichment