CVE-2025-9729

7.3 HIGH

📋 TL;DR

This SQL injection vulnerability in PHPGurukul Online Course Registration 3.1 allows attackers to manipulate database queries through the studentname parameter in /admin/student-registration.php. Remote attackers can potentially access, modify, or delete sensitive data including student records and administrative credentials. Organizations using PHPGurukul Online Course Registration 3.1 are affected.

💻 Affected Systems

Products:
  • PHPGurukul Online Course Registration
Versions: 3.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires no special configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, credential harvesting, and potential remote code execution through database functions.

🟠

Likely Case

Unauthorized access to student and administrative data, including personally identifiable information and potentially authentication credentials.

🟢

If Mitigated

Limited data exposure if proper input validation and database permissions are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires access to the admin interface but SQL injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://phpgurukul.com/

Restart Required: No

Instructions:

1. Check vendor website for security updates
2. If patch available, download and apply
3. Test functionality after patching

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to sanitize studentname parameter

Modify /admin/student-registration.php to validate and sanitize user input before database queries

Web Application Firewall Rules

all

Block SQL injection patterns targeting studentname parameter

Configure WAF to detect and block SQL injection attempts on /admin/student-registration.php

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in the affected file
  • Restrict access to /admin/ directory to trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Test the studentname parameter in /admin/student-registration.php with SQL injection payloads like ' OR '1'='1

Check Version:

Check PHPGurukul version in application interface or configuration files

Verify Fix Applied:

Test with SQL injection payloads after implementing fixes to ensure they are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries from /admin/student-registration.php
  • Multiple failed login attempts followed by SQL injection patterns

Network Indicators:

  • HTTP POST requests to /admin/student-registration.php containing SQL keywords in parameters

SIEM Query:

source="web_logs" AND uri="/admin/student-registration.php" AND (param="studentname" AND value MATCHES "(?i)(union|select|insert|update|delete|drop|or|and)")

🔗 References

📤 Share & Export