CVE-2025-7534
Description
A vulnerability was found in PHPGurukul Student Result Management System 2.0. It has been classified as critical. Affected is an unknown function of the file /notice-details.php of the component GET Parameter Handler. The manipulation of the argument nid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SQL injection in PHPGurukul Student Result Management System 2.0 via nid parameter allows remote attackers to extract database contents.
Root
Cause
The vulnerability resides in the notice-details.php file of PHPGurukul Student Result Management System 2.0 [1]. The application directly concatenates the user-supplied nid GET parameter into an SQL query without any sanitization or parameterized binding [2]. The code snippet $sql = "SELECT * from tblnotice where id='$noticeid'"; shows the lack of prepared statements, making it susceptible to SQL injection [2].
Exploitation
An attacker can exploit this flaw remotely without authentication by sending a crafted HTTP request to /notice-details.php?nid=... [2]. Both time-based blind injection (e.g., using SLEEP()) and UNION-based injection are possible, allowing the attacker to extract data from the database [2]. Public proof-of-concept payloads and automated tools like sqlmap have been demonstrated [2].
Impact
Successful exploitation grants unauthorized access to all database contents, including sensitive student records and admin credentials [2]. This can lead to privilege escalation, full database extraction, and potential administrative takeover of the application [2].
Mitigation
As of the publication date, no official patch has been released by PHPGurukul [1]. The vendor is advised to implement parameterized queries using PDO or MySQLi prepared statements to prevent SQL injection [1]. Given that the exploit is publicly available, administrators should apply input validation and consider disabling the vulnerable endpoint until a fix is deployed.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- cpe:2.3:a:phpgurukul:student_result_management_system:*:*:*:*:*:*:*:*Range: <=2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/4m3rr0r/PoCVulDb/blob/main/CVE-2025-7534.mdnvdExploitThird Party Advisory
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- phpgurukul.comnvdProduct
- vuldb.comnvdPermissions Required
News mentions
0No linked articles in our index yet.