Submit #797280: PHPGurukul Company Visitors Management System 2.0 SQL Injectioninfo

TitlePHPGurukul Company Visitors Management System 2.0 SQL Injection
DescriptionA SQL injection vulnerability was identified within the "/forgot-password.php" file of the "Company Visitors Management System" project. The root cause lies in the fact that attackers can inject malicious code via the parameter "email". This input is then directly utilized in SQL queries without undergoing proper sanitization or validation processes. As a result, attackers are able to fabricate input values, manipulate SQL queries, and execute unauthorized operations.
Source⚠️ https://github.com/f1rstb100d/CVE/issues/46
User
 Anonymous User
Submission04/05/2026 05:45 (13 days ago)
Moderation04/13/2026 10:25 (8 days later)
StatusDuplicate
VulDB entry310330 [PHPGurukul Company Visitor Management System 1.0 /forgot-password.php email sql injection]
Points0

Do you want to use VulDB in your project?

Use the official API to access entries easily!