Impact
A flaw in School Management System 1.0 permits an attacker to supply a crafted ID argument in /ramonsys/user/controller.php, causing the application to execute arbitrary SQL statements. This injection vulnerability could allow the attacker to read, modify or delete database records, compromising the confidentiality, integrity, and availability of the system.
Affected Systems
itsourcecode School Management System version 1.0, particular to the controller.php file handling user functions. The vulnerability arises from improperly sanitized input in the ID parameter.
Risk and Exploitability
The CVSS score of 6.9 reflects moderate to high risk, while the EPSS score of less than 1% indicates low overall exploitation probability, yet a public exploit has been released. The attack can be executed remotely through standard HTTP requests, with no special prerequisites other than access to the affected endpoint. The system is not listed in CISA's KEV catalog, but the known public exploit suggests it remains a realistic threat for exposed installations.
OpenCVE Enrichment