PHPGurukul COVID-19 TM 2021 Open Redirect via /search-report-result.php
CVE-2025-6286 Published on June 19, 2025

PHPGurukul COVID19 Testing Management System search-report-result.php redirect
A vulnerability classified as problematic has been found in PHPGurukul COVID19 Testing Management System 2021. Affected is an unknown function of the file /search-report-result.php. The manipulation of the argument q leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

NVD

Timeline

Advisory disclosed

VulDB entry created

VulDB entry last update

Weakness Type

What is an Open Redirect Vulnerability?

A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. An http parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance.

CVE-2025-6286 has been classified to as an Open Redirect vulnerability or weakness.


Products Associated with CVE-2025-6286

Want to know whenever a new CVE is published for PHPGurukul Covid19 Testing Management System? stack.watch will email you.

 

Affected Versions

PHPGurukul COVID19 Testing Management System Version 2021 is affected by CVE-2025-6286

Exploit Probability

EPSS
0.04%
Percentile
12.73%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.