A security vulnerability has been detected in PHPGurukul Online Course Registration 3.1. This issue affects some unknown processing of the file /admin/check_availability.php. The manipulation of the argument regno leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.
History

Thu, 09 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 23:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in PHPGurukul Online Course Registration 3.1. This issue affects some unknown processing of the file /admin/check_availability.php. The manipulation of the argument regno leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.
Title PHPGurukul Online Course Registration check_availability.php sql injection
First Time appeared Phpgurukul
Phpgurukul online Course Registration
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:phpgurukul:online_course_registration:*:*:*:*:*:*:*:*
Vendors & Products Phpgurukul
Phpgurukul online Course Registration
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2026-04-08T23:00:17.193Z

Updated: 2026-04-09T14:17:57.980Z

Reserved: 2026-04-08T15:26:07.930Z

Link: CVE-2026-5814

cve-icon Vulnrichment

Updated: 2026-04-09T14:17:06.827Z

cve-icon NVD

Status : Received

Published: 2026-04-09T00:16:19.827

Modified: 2026-04-09T00:16:19.827

Link: CVE-2026-5814

cve-icon Redhat

No data.