CVE-2026-5543
Description
A vulnerability was identified in PHPGurukul User Registration & Login and User Management System 3.3. The affected element is an unknown function of the file /admin/yesterday-reg-users.php. The manipulation of the argument ID leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SQL injection in PHPGurukul User Registration & Login and User Management System 3.3 via unsanitized 'id' parameter in /admin/yesterday-reg-users.php, allowing remote database compromise.
Vulnerability
Overview
The vulnerability is an SQL injection in the /admin/yesterday-reg-users.php file of PHPGurukul User Registration & Login and User Management System version 3.3. The issue arises because the id parameter received via GET request is directly used in SQL queries without proper sanitization or validation [2]. This allows an attacker to inject malicious SQL code.
Exploitation
Details
The attack vector is remote, requiring no authentication (though the file is in an admin directory). The attacker sends a crafted GET request to /admin/yesterday-reg-users.php with a malicious id parameter. The lack of input validation means the injected SQL is executed by the database server [2]. Public exploit code is available, increasing the risk.
Impact
Successful exploitation can lead to unauthorized access to the database, leakage of sensitive user data, modification or deletion of records, and potentially full control over the application and underlying server. This compromises confidentiality, integrity, and availability of the system [2].
Mitigation
As of the report, no official patch has been released for version 3.3. Users should apply input validation and parameterized queries (e.g., using PDO or prepared statements) to mitigate the vulnerability. Given the public exploit, immediate action is recommended.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 3.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.