Impact
The vulnerability in CloudClassroom-PHP-Project allows an attacker to manipulate the gnamex parameter in the /postquerypublic.php page to inject arbitrary SQL commands. This flaw maps to CWE-74 and CWE-89 and can enable the attacker to read, modify, or delete database contents, potentially compromising confidential data and application integrity.
Affected Systems
Affected installations include mathurvishal’s CloudClassroom-PHP-Project, version 1.0 and earlier revisions up to commit 5dadec098bfbbf3300d60c3494db3fb95b66e7be. The product follows a rolling release model, so newer releases may contain a fix but specific version details are not enumerated in the advisory.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity, yet the EPSS score of less than 1% suggests a low probability that this exploit is in widespread use. The attack is remote and has been published, but the vulnerability is not listed in the CISA KEV catalog. An unauthenticated attacker can trigger the injection by sending a crafted request to the vulnerable parameter, potentially leading to unauthorized data exposure or manipulation.
OpenCVE Enrichment