提出 #782877: PHPGurukul Online Shopping Portal Project 2.1 SQL Injection情報

タイトルPHPGurukul Online Shopping Portal Project 2.1 SQL Injection
説明A SQL injection vulnerability was identified within the "/pending-orders.php" file of the "Online Shopping Portal Project" project. The root cause lies in the fact that attackers can inject malicious code via the parameter "id". This input is then directly utilized in SQL queries without undergoing proper sanitization or validation processes. As a result, attackers are able to fabricate input values, manipulate SQL queries, and execute unauthorized operations.
ソース⚠️ https://github.com/f1rstb100d/CVE/issues/11
ユーザー
 Anonymous User
送信2026年03月19日 10:19 (18 日 ago)
モデレーション2026年04月04日 15:50 (16 days later)
ステータス承諾済み
VulDBエントリ355328 [PHPGurukul PHPGurukul Online Shopping Portal Project 迄 2.1 Parameter /pending-orders.php 識別子 SQLインジェクション]
ポイント20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!