- Description
- A SQL Injection was found in /admin/admin-profile.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the contactnumber POST request parameter.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
🚨 CVE-2025-25354 🔴 HIGH (7.2) 🏢 Unknown Vendor - Unknown Product 🏗️ Unknown Version 🔗 https://t.co/djyqchYEpx #CyberCron #VulnAlert https://t.co/L1M7QXKkAP
@cybercronai
17 Feb 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-25354 SQL Injection in PHPGurukul Land Record System v1.0 Remote Code Execution https://t.co/JIDAzkTwGn
@VulmonFeeds
14 Feb 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-25354 A SQL Injection was found in /admin/admin-profile.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the contactnu… https://t.co/I7stQ92fEV
@CVEnew
13 Feb 2025
175 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
New post from https://t.co/uXvPWJy6tj (CVE-2025-25354 | Record System 1.0 POST Request Parameter sql injection) has been published on https://t.co/JH8greO0mS
@WolfgangSesin
13 Feb 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"
}
],
"operator": "OR"
}
]
}
]