Impact
A flaw exists in the /news-details.php page of the PHPGurukul News Portal Project where the Comment parameter is not properly sanitized. This opens an avenue for SQL injection, allowing an attacker to craft malicious input that can alter database queries. The vulnerability is directly exploitable through the public web interface, and could lead to unauthorized data disclosure, modification, or deletion of user information, depending on the database privileges of the web application.
Affected Systems
The affected product is PHPGurukul News Portal Project, version 4.1, deployed by vendors at PHPGurukul. The specific file impacted is news-details.php, and attacks target the Comment input field presented to users via the portal.
Risk and Exploitability
The CVSS score of 6.9 classifies this as a moderate severity flaw. No EPSS score is supplied, and it is not listed in the CISA KEV catalog, but the exploit has been made publicly available, indicating real-world usage. Attackers can initiate the payload remotely by submitting a crafted comment through the portal, with no authentication required. Given these conditions, the risk of exploitation remains significant while the potential impact could compromise confidentiality and integrity of stored data.
OpenCVE Enrichment