ProjectWorlds Gym Management System1.0 is vulnerable to SQL Injection via the "id" parameter in the profile/edit.php page
References
| Link | Resource |
|---|---|
| https://github.com/ChuckBartowski7/Vulnerability-Research/blob/main/CVE-2025-60311/README.md | Exploit Third Party Advisory |
| https://github.com/projectworldsofficial/Gym-Management-System-Project-in-PHP | Product |
| https://youtu.be/J_7G_AahgSw | Exploit |
Configurations
History
16 Oct 2025, 15:27
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Projectworlds
Projectworlds gym Management System |
|
| References | () https://github.com/ChuckBartowski7/Vulnerability-Research/blob/main/CVE-2025-60311/README.md - Exploit, Third Party Advisory | |
| References | () https://github.com/projectworldsofficial/Gym-Management-System-Project-in-PHP - Product | |
| References | () https://youtu.be/J_7G_AahgSw - Exploit | |
| CPE | cpe:2.3:a:projectworlds:gym_management_system:1.0:*:*:*:*:*:*:* |
08 Oct 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-08 20:15
Updated : 2025-10-16 15:27
NVD link : CVE-2025-60311
Mitre link : CVE-2025-60311
CVE.ORG link : CVE-2025-60311
JSON object : View
Products Affected
projectworlds
- gym_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
