Description
A vulnerability was found in itsourcecode Student Management System 1.0. The affected element is an unknown function of the file /ramonsys/enrollment/controller.php. The manipulation of the argument ID results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.
Published: 2026-02-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Data Access
Action: Patch
AI Analysis

Impact

The vulnerability resides in an unknown function within /ramonsys/enrollment/controller.php of itsourcecode Student Management System 1.0. An attacker can manipulate the ID argument to inject arbitrary SQL statements. This allows the attacker to read, modify or delete data stored in the underlying database, potentially exposing or corrupting sensitive student information. The weakness is a classic SQL injection flaw, reflected in CWEs 74 and 89, which can compromise confidentiality and integrity of the database.

Affected Systems

itsourcecode Student Management System version 1.0 is affected. The vulnerability is tied to the controller.php file in the enrollment module of this version. No other versions or products are listed as impacted.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, while the EPSS score of less than 1% suggests that the probability of exploitation at present is low. The vulnerability is not listed in the CISA KEV catalog, implying no confirmed active exploitation. The attack can be carried out remotely by submitting a crafted ID parameter to the vulnerable endpoint, without the need for authentication or local access.

Generated by OpenCVE AI on April 17, 2026 at 22:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to a patched or newer version of itsourcecode Student Management System if one is available.
  • Validate and sanitise all input parameters, particularly the ID argument, before incorporating them into any SQL statement.
  • Replace dynamic SQL queries with parameterised queries or prepared statements to prevent injection.
  • Restrict access to /ramonsys/enrollment/controller.php to authorized users or trusted network segments.

Generated by OpenCVE AI on April 17, 2026 at 22:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode school Management System
CPEs cpe:2.3:a:itsourcecode:school_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Itsourcecode school Management System

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode student Management System
Vendors & Products Itsourcecode
Itsourcecode student Management System

Fri, 06 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in itsourcecode Student Management System 1.0. The affected element is an unknown function of the file /ramonsys/enrollment/controller.php. The manipulation of the argument ID results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.
Title itsourcecode Student Management System controller.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode School Management System Student Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:23:09.097Z

Reserved: 2026-02-05T19:28:22.536Z

Link: CVE-2026-2011

cve-icon Vulnrichment

Updated: 2026-02-06T16:51:09.903Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T09:15:51.770

Modified: 2026-02-10T18:12:30.947

Link: CVE-2026-2011

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T23:00:12Z

Weaknesses