| Title | PHPGurukul Hospital Management System 4.0 SQL Injection |
|---|
| Description | PHPGurukul Hospital Management System V4.0 is vulnerable to SQL Injection. The vulnerability is located in the '/hospital/hms/admin/manage-users.php' file via the 'id' parameter. An authenticated remote attacker can exploit this vulnerability to execute arbitrary SQL commands by injecting malicious SQL syntax (e.g., time-based blind injection), which may lead to unauthorized data deletion or sensitive information disclosure. |
|---|
| Source | ⚠️ https://github.com/Shaon-Xis/PHPGurukul-HMS-SQLi-PoC/tree/main |
|---|
| User | yan1451 (UID 94854) |
|---|
| Submission | 01/31/2026 03:28 (3 months ago) |
|---|
| Moderation | 02/07/2026 16:15 (8 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 344882 [PHPGurukul Hospital Management System 4.0 /admin/manage-users.php ID sql injection] |
|---|
| Points | 20 |
|---|