{"vulnerability": "cve-2025-3971", "sightings": [{"uuid": "20f6b58a-f13e-43a1-92c6-47580a23903d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3971", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnslbq3rqg2v", "content": "", "creation_timestamp": "2025-04-27T15:35:00.286452Z"}, {"uuid": "75da9090-79e9-4e82-affe-0316d4429197", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39716", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "1dd98b71-73be-4c76-a9f0-58fe8ab5ce4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3971", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13620", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3971\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical was found in PHPGurukul COVID19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /add-phlebotomist.php. The manipulation of the argument empid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-27T13:31:05.118Z\n\ud83d\udccf Modified: 2025-04-27T13:31:05.118Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.306307\n2. https://vuldb.com/?ctiid.306307\n3. https://vuldb.com/?submit.557391\n4. https://github.com/skyrainoh/CVE/issues/1\n5. https://phpgurukul.com/", "creation_timestamp": "2025-04-27T14:09:49.000000Z"}, {"uuid": "cb1f3b58-4044-4fc8-a9ac-b49ebc5b79c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39710", "type": "seen", "source": "Telegram/SAK0ZRiRQ5HdZKHx3TsQJGJsYeEPKAjgAz4XgXOGOKUcr7A", "content": "", "creation_timestamp": "2026-01-12T16:02:48.000000Z"}, {"uuid": "1ef03d65-a6dd-4042-bd09-31af2b51f9b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3971", "type": "seen", "source": "https://t.me/cvedetector/23843", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3971 - PHPGurukul COVID19 Testing Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3971 \nPublished : April 27, 2025, 2:15 p.m. | 30\u00a0minutes ago \nDescription : A vulnerability classified as critical was found in PHPGurukul COVID19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /add-phlebotomist.php. The manipulation of the argument empid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-27T17:09:27.000000Z"}, {"uuid": "bf47d4a6-d135-42ce-9bba-13114056123c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39715", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "5b8a1a83-7391-46d2-a147-3b486911b1a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39716", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "34674ac0-45b5-49d6-a56c-4a09aa5568d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39715", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "dfcc1033-c18b-4fb0-92d1-22963b228f9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-39719", "type": "published-proof-of-concept", "source": "Telegram/shQsG5TFmMrzus3uWOqA-vjUO4oHdrJHZ6Xu7ifps-_tm5s", "content": "", "creation_timestamp": "2026-01-07T20:04:13.000000Z"}, {"uuid": "8815ea55-726a-466a-92de-6e636cc4dbae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3971", "type": "published-proof-of-concept", "source": "Telegram/Geb4-Qs6AXSIlErxrR7GPcz1A7YWpQCMgfL621ug9drDdSk", "content": "", "creation_timestamp": "2025-04-27T16:00:33.000000Z"}]}