VYPR
Medium severity6.3NVD Advisory· Published Apr 5, 2026· Updated Apr 29, 2026

CVE-2026-5558

CVE-2026-5558

Description

A flaw has been found in PHPGurukul PHPGurukul Online Shopping Portal Project up to 2.1. Impacted is an unknown function of the file /pending-orders.php of the component Parameter Handler. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in PHPGurukul Online Shopping Portal up to 2.1 via the 'id' parameter in /pending-orders.php allows remote attackers to execute arbitrary SQL queries.

Vulnerability

Overview

A SQL injection vulnerability exists in the PHPGurukul Online Shopping Portal Project up to version 2.1. The flaw resides in the unknown function of the file /pending-orders.php, where user input passed via the id GET parameter is directly incorporated into SQL queries without proper sanitization or validation [1][2]. This lack of parameterized queries (despite the vendor's PDO tutorials on PDO usage) allows an attacker to inject malicious SQL statements.

Attack

Vector

An unauthenticated attacker can exploit this vulnerability remotely by sending a crafted HTTP GET request to /pending-orders.php with a malicious id parameter. Proof-of-concept payloads have been published, including a time-based blind SQL injection using RLIKE and SLEEP() functions [2]. No special privileges or network position beyond internet access is required.

Impact

Successful exploitation can lead to unauthorized database access, sensitive data leakage (e.g., customer credentials, order details), data manipulation, denial of service, and potentially full system compromise [2]. The impact severity is heightened by the remote attack vector and published exploit code.

Mitigation

As of the advisory date, no patch has been confirmed. The vendor's official website offers the vulnerable software version [1]. Users are advised to apply input validation, use prepared statements with PDO, and limit database user privileges until a fix is released. Given the published exploit, this vulnerability may be considered for inclusion in CISA KEV.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.