Vulnerability Description
A vulnerability was found in PHPGurukul Curfew e-Pass Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/pass-bwdates-report.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phpgurukul | Curfew E-Pass Management System | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/bluechips-zhao/myCVE/issues/3ExploitThird Party Advisory
- https://phpgurukul.com/Product
- https://vuldb.com/?ctiid.306511Permissions Required
- https://vuldb.com/?id.306511Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.559983Third Party AdvisoryVDB Entry
- https://github.com/bluechips-zhao/myCVE/issues/3ExploitThird Party Advisory
FAQ
What is CVE-2025-4074?
CVE-2025-4074 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was found in PHPGurukul Curfew e-Pass Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/pass-bwdate...
How severe is CVE-2025-4074?
CVE-2025-4074 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-4074?
Check the references section above for vendor advisories and patch information. Affected products include: Phpgurukul Curfew E-Pass Management System.