Complaint Management System
Sign in to watchby Phpgurukul
Source repositories
CVEs (7)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-57151 | Hig | 0.57 | 8.8 | 0.00 | Sep 3, 2025 | phpgurukul Complaint Management System 2.0 is vulnerable to Cross Site Scripting (XSS) in admin/userprofile.php via the fullname parameter. | |
| CVE-2025-57146 | Hig | 0.53 | 8.1 | 0.00 | Sep 3, 2025 | phpgurukul Complaint Management System in PHP 2.0 is vulnerable to SQL Injection in user/reset-password.php via the mobileno parameter. | |
| CVE-2025-57147 | Hig | 0.49 | 7.5 | 0.00 | Sep 3, 2025 | A SQL Injection vulnerability was found in phpgurukul Complaint Management System 2.0. The vulnerability is due to lack of input validation of multiple parameters including fullname, email, and contactno in user/registration.php. | |
| CVE-2025-57150 | Hig | 0.47 | 7.2 | 0.00 | Sep 3, 2025 | phpgurukul Complaint Management System in PHP 2.0 is vulnerable to Cross Site Scripting (XSS) in admin/subcategory.php via the categoryName parameter. | |
| CVE-2025-57149 | Med | 0.42 | 6.5 | 0.00 | Sep 3, 2025 | phpgurukul Complaint Management System 2.0 is vulnerable to SQL Injection in /complaint-details.php via the cid parameter. | |
| CVE-2025-7834 | Med | 0.28 | 4.3 | 0.00 | Jul 19, 2025 | A vulnerability, which was classified as problematic, was found in PHPGurukul Complaint Management System 2.0. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
| CVE-2025-7802 | Low | 0.23 | 3.5 | 0.00 | Jul 18, 2025 | A vulnerability was found in PHPGurukul Complaint Management System 2.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/complaint-search.php. The manipulation of the argument Search leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. |