CVE-2026-5636
Description
A weakness has been identified in PHPGurukul Online Shopping Portal Project 2.1. This affects an unknown part of the file /cancelorder.php of the component Parameter Handler. This manipulation of the argument oid causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
PHPGurukul Online Shopping Portal Project 2.1 suffers from a SQL injection vulnerability in /cancelorder.php via the oid parameter, enabling remote unauthenticated attackers to manipulate database queries.
Root
Cause A SQL injection vulnerability has been discovered in the PHPGurukul Online Shopping Portal Project version 2.1, specifically within the /cancelorder.php file. The vulnerability resides in the Parameter Handler component. The application fails to properly sanitize or validate user input supplied through the oid parameter prior to its use in SQL queries [2]. This oversight allows an attacker to inject arbitrary SQL code into the query [1].
Exploitation
Exploitation can be initiated remotely and does not require authentication [1]. A time-based blind SQL injection payload has been demonstrated by a security researcher, using the oid parameter in a GET request with a crafted value like 6' RLIKE SLEEP(5)-- VAsx [2]. This confirms that an attacker can infer the success of injection by observing response delays, even in the absence of direct error output. The exploit details have been made publicly available [1].
Impact
Successful exploitation allows an attacker to gain unauthorized access to the underlying database [2]. This could lead to the leakage of sensitive data (such as user credentials or order details), data tampering, or complete compromise of the database server, potentially affecting the broader system and business operations [1].
Mitigation
The vendor, PHPGurukul, provides tutorials on secure coding practices including the use of Parameterized Statements (like PDO) to prevent SQL injection [1]. However, as of the publication date, no official patched version has been released for this specific vulnerability. The affected software is the Online Shopping Portal Project version 2.1 [2]. It is strongly recommended that users apply input validation and parameterized queries to the oid parameter in cancelorder.php as a workaround, or consider replacing the application with a maintained alternative.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: =2.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.