Impact
The vulnerability exists in the admin interface of PHPGurukul News Portal Project, where the sucatdescription parameter is processed without proper sanitization. This allows an attacker to inject arbitrary SQL statements, leading to unauthorized data disclosure or manipulation. The weakness is a classic SQL injection flaw, classified as CWE-89, and also involves improper handling of query fragments, CWE-74. The impact can range from database corruption to full control over the affected system, depending on the privileges of the database account used by the application.
Affected Systems
The affected product is PHPGurukul News Portal Project, version 4.1. No other versions are explicitly listed as vulnerable, but the description specifies "some unknown processing" implying that the flaw may affect any instance using that file without proper input validation.
Risk and Exploitability
The vulnerability carries a CVSS score of 5.1, indicating moderate severity. EPSS data is not available and the issue is not listed in the CISA KEV catalog. The attack can be launched remotely and the exploit is publicly available, increasing the likelihood of exploitation in exposed installations.
OpenCVE Enrichment