CVE-2026-3402
Plain English Summary
AI-powered analysis for quick understanding
An attacker can inject malicious scripts into the PHPGurukul Student Record Management System through the Course Short Name field, potentially allowing them to steal sensitive information from users who visit the compromised page. This vulnerability can be exploited remotely, meaning the attacker doesn't need physical access to the system to carry out the attack.
Technical Description
A security vulnerability has been detected in PHPGurukul Student Record Management System up to 1.0. This vulnerability affects unknown code of the file /edit-course.php. Such manipulation of the argument Course Short Name leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 2, 2026
about 1 month ago
Last Modified
Mar 3, 2026
about 1 month ago
Vendor
phpgurukul
Product
student record system
Related Vulnerabilities
This vulnerability allows an attacker to inject malicious scripts into the student record system, potentially compromising users' data or sessions when they visit the affected page. The attack can be executed remotely by manipulating a specific argument in the URL, making it easy for attackers to exploit.
This vulnerability allows an attacker to manipulate the database of the student management system by injecting harmful SQL code through the searchdata parameter, potentially exposing sensitive information or altering data. To exploit this, the attacker needs access to the search feature on the admin page.
An attacker can trick a logged-in user of the gym management system into unknowingly updating their profile information by sending them a malicious link. This vulnerability requires the user to be logged in and click on the link while visiting the attacker's site, potentially allowing the attacker to change the user's details without their consent.