Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Online Shopping Portal Project — Vulnerabilities & Security Advisories 13

All 13 CVE vulnerabilities found in Online Shopping Portal Project, with AI-generated Chinese analysis, references, and POCs.

Vendor: PHPGurukul

CVE IDTitleCVSSSeverityPublished
CVE-2026-5641 PHPGurukul Online Shopping Portal Project Parameter update-image1.php sql injection CWE-89 6.3 Medium2026-04-06
CVE-2026-5640 PHPGurukul Online Shopping Portal Project Parameter update-image2.php sql injection CWE-89 6.3 Medium2026-04-06
CVE-2026-5639 PHPGurukul Online Shopping Portal Project Parameter update-image3.php sql injection CWE-89 6.3 Medium2026-04-06
CVE-2026-5636 PHPGurukul Online Shopping Portal Project Parameter cancelorder.php sql injection CWE-89 6.3 Medium2026-04-06
CVE-2026-5635 PHPGurukul Online Shopping Portal Project Parameter categorywise-products.php sql injection CWE-89 6.3 Medium2026-04-06
CVE-2026-5606 PHPGurukul Online Shopping Portal Project Parameter order-details.php sql injection CWE-89 6.3 Medium2026-04-06
CVE-2026-5583 PHPGurukul Online Shopping Portal Project Parameter my-profile.php sql injection CWE-89 6.3 Medium2026-04-05
CVE-2026-5560 PHPGurukul Online Shopping Portal Project Parameter payment-method.php sql injection CWE-89 6.3 Medium2026-04-05
CVE-2026-5552 PHPGurukul Online Shopping Portal Project Parameter sub-category.php sql injection CWE-89 6.3 Medium2026-04-05
CVE-2025-9013 PHPGurukul Online Shopping Portal Project password-recovery.php sql injection CWE-89 7.3 High2025-08-15
CVE-2025-9012 PHPGurukul Online Shopping Portal Project bill-ship-addresses.php sql injection CWE-89 7.3 High2025-08-15
CVE-2025-9011 PHPGurukul Online Shopping Portal Project signup.php sql injection CWE-89 7.3 High2025-08-15
CVE-2025-5367 PHPGurukul Online Shopping Portal Project category.php sql injection CWE-89 7.3 High2025-05-31

All 13 known CVE vulnerabilities affecting Online Shopping Portal Project with full Chinese analysis, references, and POCs where available.