CVE-2023-6648
moderate-risk
Published 2023-12-10
A vulnerability, which was classified as critical, was found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file password-recovery.php. The manipulation of the argument username/contactno leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Do I need to act?
-
0.07% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.3/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (8)
Product
https://phpgurukul.com/
Permissions Required
https://vuldb.com/?ctiid.247341
Permissions Required
https://vuldb.com/?id.247341
Third Party Advisory
https://vuldb.com/?submit.246745
Permissions Required
https://vuldb.com/?ctiid.247341
Permissions Required
https://vuldb.com/?id.247341
31
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal