{"vulnerability": "CVE-2025-3220", "sightings": [{"uuid": "5e99792a-3c1d-4eb3-ab4b-8888bd3b7e0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32202", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114313038071535604", "content": "", "creation_timestamp": "2025-04-10T09:49:01.722719Z"}, {"uuid": "ef8fd0d7-b9d3-49ab-add9-933b5e75e862", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3220", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lly35vzzhw2i", "content": "", "creation_timestamp": "2025-04-04T09:12:08.955304Z"}, {"uuid": "b9925e4f-eaaa-45bc-9dcd-e6e58eed6258", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32206", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114313038096811543", "content": "", "creation_timestamp": "2025-04-10T09:49:02.164501Z"}, {"uuid": "49cf23c8-dcbc-4b71-988e-e34dba436150", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3220", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10419", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3220\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in PHPGurukul e-Diary Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard.php. The manipulation of the argument Category leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-04T08:00:16.245Z\n\ud83d\udccf Modified: 2025-04-04T08:00:16.245Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303181\n2. https://vuldb.com/?ctiid.303181\n3. https://vuldb.com/?submit.546176\n4. https://github.com/JunGu-W/cve/issues/2\n5. https://phpgurukul.com/", "creation_timestamp": "2025-04-04T08:36:11.000000Z"}, {"uuid": "0f87ae09-df0a-4d3b-9990-d450e709b4f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32206", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvjlbwefth2z", "content": "", "creation_timestamp": "2025-08-03T21:02:49.978230Z"}, {"uuid": "53ea5b10-cfb6-4c4e-8110-fe85a1394aee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32206", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/39204", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aCVE-2025-32206\nURL\uff1ahttps://github.com/postal-filled-zap/CVE\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-04T06:31:10.000000Z"}, {"uuid": "c064cdb9-0589-430d-aa90-958c4cca57b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32206", "type": "published-proof-of-concept", "source": "Telegram/r_wHa_CRNaMye5ECauPymqNZVxRHs48C673m_dT_O1oKg64", "content": "", "creation_timestamp": "2025-06-04T09:00:05.000000Z"}, {"uuid": "dfd5e4f8-9cfa-4eca-adce-d36e4f5df328", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3220", "type": "seen", "source": "https://t.me/cvedetector/22107", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3220 - PHPGurukul e-Diary Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-3220 \nPublished : April 4, 2025, 8:15 a.m. | 1\u00a0hour, 40\u00a0minutes ago \nDescription : A vulnerability was found in PHPGurukul e-Diary Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard.php. The manipulation of the argument Category leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T12:09:55.000000Z"}, {"uuid": "2e4e2de6-0df4-4150-b681-f03b17112e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32206", "type": "published-proof-of-concept", "source": "Telegram/P5LDm3S4VTfGYBgu3ytMcEur8FEGyy2Co8KdeMUu5EMrSc8", "content": "", "creation_timestamp": "2025-04-11T23:00:05.000000Z"}, {"uuid": "381653bd-7383-4269-89ee-c81d8d2758ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32206", "type": "published-proof-of-concept", "source": "Telegram/B3Ix6c3MChBxGtjJd9wydNqCLtkZFp2u31J3Uh-KqNTLVQg", "content": "", "creation_timestamp": "2025-04-12T01:00:08.000000Z"}]}