Impact
A flaw in the register.php file of PHPGurukul Daily Expense Tracking System 1.1 allows an attacker to inject arbitrary SQL through the email argument. The injected SQL can modify, delete, or leak sensitive data stored in the database, thereby compromising confidentiality and integrity of user information. The vulnerability is exploitable remotely via a standard HTTP request.
Affected Systems
The affected product is PHPGurukul Daily Expense Tracking System version 1.1. Only the register.php file’s email handling is impacted; no other versions are documented as vulnerable.
Risk and Exploitability
The CVSS score of 6.9 indicates a medium to high severity. EPSS data is unavailable, and the issue is not listed in the KEV catalog. Exploitation is possible from any network with access to the registration endpoint; attackers can manipulate the email field in a standard request to inject and execute SQL commands.
OpenCVE Enrichment