A security flaw has been discovered in PHPGurukul Beauty Parlour Management System 1.1. Impacted is an unknown function of the file /admin/contact-us.php. The manipulation of the argument mobnumber results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
References
Link | Resource |
---|---|
https://github.com/dad-zm/myCVE/issues/3 | Exploit Issue Tracking |
https://phpgurukul.com/ | Product |
https://vuldb.com/?ctiid.322141 | Permissions Required VDB Entry |
https://vuldb.com/?id.322141 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.641237 | Third Party Advisory VDB Entry |
https://github.com/dad-zm/myCVE/issues/3 | Exploit Issue Tracking |
Configurations
History
03 Sep 2025, 15:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dad-zm/myCVE/issues/3 - Exploit, Issue Tracking | |
References | () https://phpgurukul.com/ - Product | |
References | () https://vuldb.com/?ctiid.322141 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.322141 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.641237 - Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:a:phpgurukul:beauty_parlour_management_system:1.1:*:*:*:*:*:*:* | |
First Time |
Phpgurukul beauty Parlour Management System
Phpgurukul |
02 Sep 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dad-zm/myCVE/issues/3 - |
02 Sep 2025, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-02 05:15
Updated : 2025-09-03 15:46
NVD link : CVE-2025-9814
Mitre link : CVE-2025-9814
CVE.ORG link : CVE-2025-9814
JSON object : View
Products Affected
phpgurukul
- beauty_parlour_management_system