Impact
A vulnerability was discovered in SourceCodester Online Class Record System 1.0 affecting the admin/message/search.php script. Manipulating the 'term' argument results in a SQL injection. This flaw allows an attacker to execute arbitrary SQL statements against the backend database, potentially exposing sensitive data, corrupting or deleting data, and compromising system availability. The weakness is a classic SQL injection (CWE‑89) and also involves improper command construction (CWE‑74).
Affected Systems
The affected product is SourceCodester Online Class Record System version 1.0. No other vendors or product versions were mentioned. The vulnerability is tied to the /admin/message/search.php endpoint of that system.
Risk and Exploitability
The CVSS score of 6.9 indicates a medium severity, and the EPSS score of <1% suggests a low likelihood of exploitation at present. The vulnerability is publicly disclosed and can be triggered remotely by sending a crafted 'term' request to the admin area. Based on the description, it is inferred that the attack may require administrative authentication or network access to the system, though the description does not specify authentication requirements. The vulnerability is not yet listed in the CISA KEV catalog.
OpenCVE Enrichment