{"vulnerability": "CVE-2025-4553", "sightings": [{"uuid": "38718306-b132-4b77-91d7-45d02285317f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4553", "type": "published-proof-of-concept", "source": "Telegram/uE9n1u9a9if1Nv_QFWLw0wRNMutCfzKYCXy9qgufB4ZCJSI", "content": "", "creation_timestamp": "2025-05-12T03:30:48.000000Z"}, {"uuid": "9a0bd346-8ee7-4a59-b322-affb99fcdb89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4553", "type": "seen", "source": "https://t.me/cvedetector/25059", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4553 - PHPGurukul Apartment Visitors Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-4553 \nPublished : May 12, 2025, 1:15 a.m. | 37\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul Apartment Visitors Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/bwdates-reports-details.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-12T04:24:23.000000Z"}, {"uuid": "b1697420-0dd9-475d-a516-0f2f24edd0fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4553", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lox5s4atwm24", "content": "", "creation_timestamp": "2025-05-12T04:42:09.796461Z"}]}