VYPR
Medium severity6.3NVD Advisory· Published Apr 5, 2026· Updated Apr 29, 2026

CVE-2026-5583

CVE-2026-5583

Description

A security vulnerability has been detected in PHPGurukul Online Shopping Portal Project 2.1. This affects an unknown part of the file /my-profile.php of the component Parameter Handler. The manipulation of the argument fullname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in PHPGurukul Online Shopping Portal 2.1 via the fullname parameter in /my-profile.php allows remote attackers to compromise the database.

Vulnerability

Analysis

A SQL injection vulnerability has been identified in the PHPGurukul Online Shopping Portal Project version 2.1. The flaw resides in the /my-profile.php file, where the fullname parameter is processed without adequate sanitization or validation [2]. This allows an attacker to inject arbitrary SQL commands through the parameter, as the input is directly used in database queries [2]. The vulnerability was publicly disclosed and a proof-of-concept exploit is available [CVE description].

Attack

Vector

The attack can be initiated remotely, requiring no authentication beyond the normal session context [CVE description]. The fullname parameter is sent via a POST request. A confirmed payload uses time-based blind SQL injection with a RLIKE operator and SLEEP function to determine if injection is possible [2]. This technique allows an attacker to extract information bit by bit by observing server response times [2].

Impact

Successful exploitation grants the attacker unauthorized access to the underlying database. This can lead to sensitive data leakage (e.g., user credentials, personal information), data tampering, or complete system compromise [2]. The impact is severe for both data confidentiality and business continuity, as the attacker could manipulate or delete critical data [2].

Mitigation

The vendor, PHPGurukul, provides guidance on using PDO (PHP Data Objects) for database operations [1]. The official recommendation for preventing SQL injection is to use parameterized queries or prepared statements, which ensure user input is never directly concatenated into SQL strings. As of this writing, no specific patch for this version is mentioned beyond following secure coding practices. Users should upgrade to a fixed version if one becomes available or apply input validation and parameterized queries immediately.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.