Impact
The School Management System for Wordpress plugin is vulnerable to a Local File Inclusion via the 'page' parameter. Authenticated users with Subscriber-level access and higher can include and execute arbitrary server files. This permits bypassing access controls, retrieving sensitive data, and, when chained with the plugin’s dashboard view files, updating the passwords of Super Administrator accounts in Multisite installations, resulting in privilege escalation.
Affected Systems
The vulnerability affects all releases of the School Management System for Wordpress plugin up to and including 93.1.0. The vendor released a patched version 1.93.1 on 02‑07‑2025 that fixes the flaw.
Risk and Exploitability
With a CVSS score of 8.8 the issue is classified as high severity. The EPSS score is less than 1 %, indicating that exploitation is unlikely but still possible. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it by submitting a crafted 'page' parameter in a request while logged in as a Subscriber or higher. Successful exploitation would allow arbitrary PHP execution and potential privilege escalation to a Super Administrator.
OpenCVE Enrichment
EUVD