Impact
SQL Injection vulnerability exists in Clickedu SaaS platform during report generation. An authenticated remote attacker can exploit the non-expiring session token and append malicious characters to the 'id_alu' parameter in the PDF generation URL, leading to boolean-based or time-based blind SQL injection. The exploit enables reading confidential database information without needing higher privileges.
Affected Systems
Clickedu SaaS platform; all current versions are affected until the integration update released on 26/01.
Risk and Exploitability
The vulnerability has a CVSS score of 8.3, indicating high severity, but the EPSS score is less than 1%, suggesting a low probability of exploitation. It is not listed in the CISA KEV catalog. The attack requires an authenticated remote user and relies on missing input validation and a long-lived session token.
OpenCVE Enrichment