Description
A vulnerability was found in SourceCodester Online Class Record System 1.0. This vulnerability affects unknown code of the file /admin/subject/controller.php. Performing a manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Published: 2026-02-07
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Patch ASAP
AI Analysis

Impact

A flaw exists in the SourceCodester Online Class Record System 1.0 within the /admin/subject/controller.php file. An attacker can manipulate the ID argument supplied to the script, causing the application to embed unsanitized input directly into a SQL statement. This lets the attacker execute arbitrary SQL commands against the underlying database, potentially exposing, modifying, or deleting sensitive data. The vulnerability is exploitable over the network, meaning an unauthenticated remote user can trigger it through legitimate HTTP requests using a crafted ID parameter, a likely attack vector inferred from the description.

Affected Systems

This vulnerability affects the SourceCodester Online Class Record System product version 1.0, as distributed by SourceCodester. No other versions or vendors are currently listed as affected. A public demonstration of the flaw exists for this specific version.

Risk and Exploitability

The CVSS base score is 6.9, indicating a high severity. EPSS indicates a very low likelihood of exploitation, but the vulnerability is known to have a public exploit and is reachable remotely without authentication. The flaw is not in CISA's KEV catalog. Attackers with the ability to send HTTP requests to the /admin/subject/controller.php endpoint can elevate their privileges within the database. Due to the low exploitation probability, the risk is moderate but the potential impact of data exposure or loss remains significant.

Generated by OpenCVE AI on April 18, 2026 at 13:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy an official patch or upgrade to the latest version of SourceCodester Online Class Record System when released.
  • If a patch is unavailable, modify the application to use prepared statements or parameterized queries for all database interactions involving the ID parameter.
  • Implement input validation to ensure the ID value conforms to expected numeric or alphanumeric formats before using it in a query.
  • Restrict access to the /admin/subject/controller.php script to authenticated administrative users and enforce proper access controls.

Generated by OpenCVE AI on April 18, 2026 at 13:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Janobe
Janobe online Class Record System
CPEs cpe:2.3:a:janobe:online_class_record_system:1.0:*:*:*:*:*:*:*
Vendors & Products Janobe
Janobe online Class Record System

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester online Class Record System
Vendors & Products Sourcecodester
Sourcecodester online Class Record System

Sat, 07 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in SourceCodester Online Class Record System 1.0. This vulnerability affects unknown code of the file /admin/subject/controller.php. Performing a manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Title SourceCodester Online Class Record System controller.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Janobe Online Class Record System
Sourcecodester Online Class Record System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:32:50.297Z

Reserved: 2026-02-06T08:25:35.262Z

Link: CVE-2026-2089

cve-icon Vulnrichment

Updated: 2026-02-10T15:54:33.405Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-07T15:15:57.960

Modified: 2026-02-10T13:58:19.080

Link: CVE-2026-2089

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:30:45Z

Weaknesses