| Titre | PHPGurukul Hospital Management System 4.0 SQL Injection |
|---|
| Description | PHPGurukul Hospital Management System V4.0 is vulnerable to SQL Injection. The vulnerability is located in the '/hospital/hms/admin/manage-users.php' file via the 'id' parameter. An authenticated remote attacker can exploit this vulnerability to execute arbitrary SQL commands by injecting malicious SQL syntax (e.g., time-based blind injection), which may lead to unauthorized data deletion or sensitive information disclosure. |
|---|
| La source | ⚠️ https://github.com/Shaon-Xis/PHPGurukul-HMS-SQLi-PoC/tree/main |
|---|
| Utilisateur | yan1451 (UID 94854) |
|---|
| Soumission | 31/01/2026 03:28 (il y a 3 mois) |
|---|
| Modérer | 07/02/2026 16:15 (8 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 344882 [PHPGurukul Hospital Management System 4.0 /admin/manage-users.php ID injection SQL] |
|---|
| Points | 20 |
|---|