Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 05 Apr 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in PHPGurukul Online Shopping Portal Project 2.1. The impacted element is an unknown function of the file /payment-method.php of the component Parameter Handler. Performing a manipulation of the argument paymethod results in sql injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. | |
| Title | PHPGurukul Online Shopping Portal Project Parameter payment-method.php sql injection | |
| First Time appeared |
Phpgurukul
Phpgurukul online Shopping Portal Project |
|
| Weaknesses | CWE-74 CWE-89 |
|
| CPEs | cpe:2.3:a:phpgurukul:online_shopping_portal_project:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Phpgurukul
Phpgurukul online Shopping Portal Project |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-05T10:30:12.323Z
Reserved: 2026-04-04T13:56:11.469Z
Link: CVE-2026-5560
No data.
Status : Received
Published: 2026-04-05T11:16:56.600
Modified: 2026-04-05T11:16:56.600
Link: CVE-2026-5560
No data.
OpenCVE Enrichment
No data.