A vulnerability was determined in PHPGurukul Hospital Management System 4.0. This impacts an unknown function of the file /admin/manage-users.php. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
References
| Link | Resource |
|---|---|
| https://github.com/Shaon-Xis/PHPGurukul-HMS-SQLi-PoC/tree/main | Exploit Third Party Advisory |
| https://github.com/Shaon-Xis/PHPGurukul-HMS-SQLi-PoC/tree/main#4-proof-of-concept-reproduction-steps | Exploit Third Party Advisory |
| https://phpgurukul.com/ | Product |
| https://vuldb.com/?ctiid.344882 | Permissions Required VDB Entry |
| https://vuldb.com/?id.344882 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.749592 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-02-08 20:15
Updated : 2026-02-10 14:44
NVD link : CVE-2026-2179
Mitre link : CVE-2026-2179
CVE.ORG link : CVE-2026-2179
JSON object : View
Products Affected
phpgurukul
- hospital_management_system
