Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2025-2473Injection in Company Visitor Management System

Severity
6.9MEDIUMNVD
EPSS
9.7%
top 7.08%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMar 18

Description

A vulnerability was found in PHPGurukul Company Visitor Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /index.php of the component Sign In. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

🔴Vulnerability Details

2
CVEList
PHPGurukul Company Visitor Management System Sign In index.php sql injection2025-03-18
GHSA
GHSA-6cq7-qpq2-9r7r: A vulnerability was found in PHPGurukul Company Visitor Management System 22025-03-18

💥Exploits & PoCs

1
Nuclei
Company Visitor Management System 1.0 - SQL Injection

📋Vendor Advisories

1
Red Hat
networkmanager: 4in6 and 6in6 protocols excessive trust2025-01-14
CVE-2025-2473 — Injection | cvebase