Description
A security flaw has been discovered in PHPGurukul News Portal Project 4.1. Impacted is an unknown function of the file /admin/check_availability.php. Performing a manipulation of the argument Username results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks.
Published: 2026-04-09
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Compromise
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in a function of /admin/check_availability.php that accepts a Username parameter. An attacker can supply a crafted value that is not properly sanitized, allowing a malicious SQL statement to be executed against the underlying database. This type of injection can enable unauthorized read, modify, or delete operations on stored data. The description explicitly states that the flaw is exploitable remotely, indicating that an unauthenticated web request could be used to trigger the flaw.

Affected Systems

PHPGurukul News Portal Project, version 4.1. The affected component is the check_availability.php script located in the /admin directory of the project. No other versions or vendors are listed in the CNA data.

Risk and Exploitability

The CVSS score of 5.1 places the issue in the medium severity range. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog, suggesting no publicly confirmed exploitation. However, the description confirms that the flaw is remotely exploitable, likely via a standard HTTP GET or POST request to /admin/check_availability.php with a manipulated Username parameter. Since the attack vector is inferred from the available information, the exact prerequisites (such as authentication or required session state) remain unclear.

Generated by OpenCVE AI on April 9, 2026 at 05:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor's patch or upgrade to the latest released version of PHPGurukul News Portal Project.
  • If a patch is unavailable, remove or restrict public access to the /admin/check_availability.php endpoint.
  • Implement input validation and parameterized queries to eliminate SQL injection vectors.
  • Check the vendor’s website or support channels for security updates or advisories.

Generated by OpenCVE AI on April 9, 2026 at 05:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in PHPGurukul News Portal Project 4.1. Impacted is an unknown function of the file /admin/check_availability.php. Performing a manipulation of the argument Username results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks.
Title PHPGurukul News Portal Project check_availability.php sql injection
First Time appeared Phpgurukul
Phpgurukul news Portal Project
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:phpgurukul:news_portal_project:*:*:*:*:*:*:*:*
Vendors & Products Phpgurukul
Phpgurukul news Portal Project
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Phpgurukul News Portal Project
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-09T14:49:43.824Z

Reserved: 2026-04-08T17:32:35.386Z

Link: CVE-2026-5840

cve-icon Vulnrichment

Updated: 2026-04-09T14:49:40.579Z

cve-icon NVD

Status : Received

Published: 2026-04-09T05:16:05.987

Modified: 2026-04-09T05:16:05.987

Link: CVE-2026-5840

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:25:00Z

Weaknesses