{"uuid": "4d1b4046-f185-4bf3-a00c-65979101a6a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-6287", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18889", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-6287\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: A vulnerability classified as problematic was found in PHPGurukul COVID19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /test-details.php of the component Take Action. The manipulation of the argument remark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-06-19T23:31:06.185Z\n\ud83d\udccf Modified: 2025-06-19T23:31:06.185Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.313291\n2. https://vuldb.com/?ctiid.313291\n3. https://vuldb.com/?submit.593878\n4. https://phpgurukul.com/", "creation_timestamp": "2025-06-19T23:40:22.000000Z"}