CVE-2025-56710
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-15

Last updated on: 2025-09-20

Assigner: MITRE

Description
A Cross-Site Request Forgery (CSRF) vulnerability was identified in the Profile Page of the PHPGurukul Student-Result-Management-System-Using-PHP-V2.0. This flaw allows an attacker to trick authenticated users into unintentionally modifying their account details. By crafting a malicious HTML page, an attacker can submit unauthorized requests to the vulnerable endpoint: /create-class.php.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-15
Last Modified
2025-09-20
Generated
2026-05-07
AI Q&A
2025-09-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
phpgurukul student_result_management_system 2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-56710 is a Cross-Site Request Forgery (CSRF) vulnerability in the Profile Page of the PHPGurukul Student-Result-Management-System-Using-PHP-V2.0. It allows an attacker to trick authenticated users into unintentionally modifying their account details by submitting unauthorized requests. The attacker crafts a malicious HTML page that automatically sends requests to the vulnerable endpoint /create-class.php, such as adding a student to a class, without the user's knowledge or interaction. [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to perform unauthorized actions on your behalf within the application if you are authenticated. For example, an attacker could add students to classes or modify account details without your consent, potentially leading to data integrity issues, unauthorized data changes, and misuse of your account privileges. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by capturing and analyzing HTTP requests to the vulnerable endpoint `/create-class.php` using an intercepting proxy tool such as Burp Suite. By observing if requests to this endpoint can be executed without proper anti-CSRF tokens or validation, you can confirm the presence of the CSRF flaw. Specifically, you can use Burp Suite Professional's "CSRF PoC Generator" to generate a proof-of-concept HTML file that simulates the attack. Commands per se are not provided, but using Burp Suite or similar tools to intercept and analyze requests is recommended. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing CSRF protection mechanisms such as adding anti-CSRF tokens to forms and validating them on the server side. Refer to the OWASP Cross-Site Request Forgery Prevention Cheat Sheet for best practices. Additionally, ensure that sensitive actions like those on `/create-class.php` require proper user interaction and validation to prevent unauthorized requests from being executed automatically. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart