VYPR
High severity7.3NVD Advisory· Published Jul 13, 2025· Updated Apr 29, 2026

CVE-2025-7534

CVE-2025-7534

Description

A vulnerability was found in PHPGurukul Student Result Management System 2.0. It has been classified as critical. Affected is an unknown function of the file /notice-details.php of the component GET Parameter Handler. The manipulation of the argument nid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in PHPGurukul Student Result Management System 2.0 via nid parameter allows remote attackers to extract database contents.

Root

Cause

The vulnerability resides in the notice-details.php file of PHPGurukul Student Result Management System 2.0 [1]. The application directly concatenates the user-supplied nid GET parameter into an SQL query without any sanitization or parameterized binding [2]. The code snippet $sql = "SELECT * from tblnotice where id='$noticeid'"; shows the lack of prepared statements, making it susceptible to SQL injection [2].

Exploitation

An attacker can exploit this flaw remotely without authentication by sending a crafted HTTP request to /notice-details.php?nid=... [2]. Both time-based blind injection (e.g., using SLEEP()) and UNION-based injection are possible, allowing the attacker to extract data from the database [2]. Public proof-of-concept payloads and automated tools like sqlmap have been demonstrated [2].

Impact

Successful exploitation grants unauthorized access to all database contents, including sensitive student records and admin credentials [2]. This can lead to privilege escalation, full database extraction, and potential administrative takeover of the application [2].

Mitigation

As of the publication date, no official patch has been released by PHPGurukul [1]. The vendor is advised to implement parameterized queries using PDO or MySQLi prepared statements to prevent SQL injection [1]. Given that the exploit is publicly available, administrators should apply input validation and consider disabling the vulnerable endpoint until a fix is deployed.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.