{"vulnerability": "CVE-2025-26156", "sightings": [{"uuid": "e3d4b0e1-e2af-4df1-ad1f-09ba4ffc2226", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26156", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5peim7o42a", "content": "", "creation_timestamp": "2025-02-14T17:16:15.070069Z"}, {"uuid": "4ac3db5e-e83d-4a7d-b332-ed7763a1a537", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26156", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5ud7pi242p", "content": "", "creation_timestamp": "2025-02-14T18:45:06.021511Z"}, {"uuid": "83aaafd7-6d01-466d-95d9-5db180b71fd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26156", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114004204832093791", "content": "", "creation_timestamp": "2025-02-14T20:49:07.731961Z"}, {"uuid": "ddad24f1-cbe1-442c-8ece-e6caa6be19c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26156", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4488", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26156\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A SQL Injection vulnerability was found in /shopping/track-orders.php in PHPGurukul Online Shopping Portal v2.1, which allows remote attackers to execute arbitrary code via orderid POST request parameter.\n\ud83d\udccf Published: 2025-02-14T18:30:53Z\n\ud83d\udccf Modified: 2025-02-14T18:30:53Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-26156\n2. https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/README.md", "creation_timestamp": "2025-02-14T19:17:54.000000Z"}, {"uuid": "0188c34b-a2cb-49d8-9a4c-c7892deb9f9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26156", "type": "seen", "source": "https://t.me/cvedetector/18114", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26156 - PHPGurukul Online Shopping Portal SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26156 \nPublished : Feb. 14, 2025, 5:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : A SQL Injection vulnerability was found in /shopping/track-orders.php in PHPGurukul Online Shopping Portal v2.1, which allows remote attackers to execute arbitrary code via orderid POST request parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T19:56:45.000000Z"}]}