Description
A vulnerability was identified in itsourcecode School Management System 1.0. This affects an unknown function of the file /ramonsys/report/index.php. The manipulation of the argument ay leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used.
Published: 2026-02-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Assess Impact
AI Analysis

Impact

The vulnerability is a classic SQL injection that occurs when the query parameter "ay" is passed to an unvalidated function in /ramonsys/report/index.php. An attacker can manipulate this argument to inject arbitrary SQL code, potentially allowing data extraction, modification, or denial of service. The weakness aligns with CWE-74 and CWE-89, indicating improper handling of external input and standard SQL injection. The impact is limited to the database accessed by the vulnerable application, but the lack of authentication requirements means any remote user can exploit it.

Affected Systems

itsourcecode School Management System 1.0, the only version referenced in the CVE data. No other versions or products are listed as affected.

Risk and Exploitability

The CVSS score of 6.9 classifies the vulnerability as moderate severity, and the EPSS score of less than 1% indicates a very low probability of exploitation at present, though the vulnerability is publicly available and can be triggered remotely. Because the attack requires only a remote HTTP request with a crafted "ay" parameter, the threat window is open for anyone who can reach the application externally. The vulnerability is not currently listed in CISA’s KEV catalog, which suggests no confirmed large‑scale exploitation so far. Nonetheless, the possibility of credential compromise or data tampering remains significant if an attacker gains access via this vector.

Generated by OpenCVE AI on April 17, 2026 at 21:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Contact the vendor to obtain an updated version of the School Management System or receive a patch that validates and sanitizes the "ay" parameter.
  • Deploy a web application firewall or intrusion prevention system configured to detect and block common SQL injection payloads targeting the /ramonsys/report/index.php endpoint.
  • Restrict external network access to the application by implementing firewall rules or network segmentation, limiting exposure of the vulnerable functionality to trusted internal networks only.

Generated by OpenCVE AI on April 17, 2026 at 21:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:itsourcecode:school_management_system:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:itsourcecode:school_management_system:1.0:*:*:*:*:*:*:*

Mon, 09 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode school Management System
Vendors & Products Itsourcecode
Itsourcecode school Management System

Sun, 08 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in itsourcecode School Management System 1.0. This affects an unknown function of the file /ramonsys/report/index.php. The manipulation of the argument ay leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used.
Title itsourcecode School Management System index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode School Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:50:21.167Z

Reserved: 2026-02-07T17:20:05.713Z

Link: CVE-2026-2189

cve-icon Vulnrichment

Updated: 2026-02-09T20:56:49.419Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T22:15:51.450

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2189

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:45:28Z

Weaknesses