

Multiple SQL Injection vulnerabilities exist in amansuryawanshi Gym-Management-System-PHP 1.0 via the 'name', 'email', and 'comment' parameters in (1) submit_co…
Published:
11 January 2026 at 23:00:00
Alert date:
12 January 2026 at 23:02:09
Source:
nvd.nist.gov
Web Technologies, Database & Storage
Multiple SQL injection vulnerabilities discovered in amansuryawanshi Gym-Management-System-PHP version 1.0. Vulnerabilities exist in three PHP files: submit_contact.php (name, email, comment parameters), secure_login.php (username, pass_key parameters), and change_s_pwd.php (login_id, pwfield, login_key parameters). Both unauthenticated and authenticated attackers can exploit these flaws to bypass authentication, execute arbitrary SQL commands, modify database records, delete data, or escalate privileges to administrator level. The vulnerabilities affect critical functions including contact submission, login authentication, and password change functionality.
Technical details
Mitigation steps:
Affected products:
Gym-Management-System-PHP
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2025-67147
https://github.com/amansuryawanshi/Gym-Management-System-PHP/issues/3
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.

