Impact
The vulnerability resides in the add-subadmins.php file of PHPGurukul News Portal Project version 4.1. An attacker can manipulate the sadminusername parameter to inject arbitrary SQL. This flaw allows unauthorized retrieval, modification, or deletion of database contents and can enable privilege escalation on the application. The impact is a compromise of data confidentiality, integrity, and possibly availability.
Affected Systems
PHPGurukul News Portal Project, version 4.1.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate severity. The EPSS score is not reported and the vulnerability is not listed in the CISA KEV catalog. Exploitation can be initiated remotely via HTTP requests to /admin/add-subadmins.php with a crafted sadminusername value. If the application is publicly accessible, attackers can easily trigger the injection without additional prerequisites.
OpenCVE Enrichment