- Description
- A SQL Injection vulnerability was found in /admin/contactus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the email POST request parameter.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
🚨 CVE-2025-25357 🔴 HIGH (7.2) 🏢 Unknown Vendor - Unknown Product 🏗️ Unknown Version 🔗 https://t.co/uWJDI1UMkB #CyberCron #VulnAlert https://t.co/PvOUjDi7nS
@cybercronai
17 Feb 2025
15 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
New post from https://t.co/uXvPWJy6tj (CVE-2025-25357 | PHPGurukul Land Record System 1.0 POST Request Parameter /admin/contactus.php sql injection) has been published on https://t.co/dRCGBlYAmI
@WolfgangSesin
13 Feb 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"
}
],
"operator": "OR"
}
]
}
]