PHPGurukul COVID-19 TM 2021 Open Redirect via /search-report-result.php
CVE-2025-6286 Published on June 19, 2025
PHPGurukul COVID19 Testing Management System search-report-result.php redirect
A vulnerability classified as problematic has been found in PHPGurukul COVID19 Testing Management System 2021. Affected is an unknown function of the file /search-report-result.php. The manipulation of the argument q leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Timeline
Advisory disclosed
VulDB entry created
VulDB entry last update
Weakness Type
What is an Open Redirect Vulnerability?
A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. An http parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials. Because the server name in the modified link is identical to the original site, phishing attempts have a more trustworthy appearance.
CVE-2025-6286 has been classified to as an Open Redirect vulnerability or weakness.
Products Associated with CVE-2025-6286
Want to know whenever a new CVE is published for PHPGurukul Covid19 Testing Management System? stack.watch will email you.
Affected Versions
PHPGurukul COVID19 Testing Management System Version 2021 is affected by CVE-2025-6286Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.