Description
PlaciPy is a placement management system designed for educational institutions. In version 1.0.0, User-controlled query parameters are passed directly into DynamoDB query/filter construction without validation or sanitization.
Published: 2026-02-09
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Data Disclosure
Action: Apply Patch
AI Analysis

Impact

Unsanitized query parameters in PlaciPy version 1.0.0 are directly incorporated into DynamoDB queries, creating a NoSQL injection vulnerability. An attacker who can submit crafted input can manipulate the query to read, alter, or delete sensitive student and institutional data, compromising confidentiality and integrity. The flaw aligns with injection weaknesses (CWE‑74).

Affected Systems

The affected product is Praskla‑Technology Assessment‑Placipy version 1.0.0, used by educational institutions for placement management. No other versions are currently listed as vulnerable. The application interacts with an Amazon DynamoDB backend.

Risk and Exploitability

With a CVSS score of 9.3 the vulnerability is considered severe, though the EPSS score of less than 1% indicates a low current likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack vector is likely through exposed web or API endpoints where query parameters are processed; no authentication or high‑privilege requirement is mentioned, suggesting that even unauthenticated users could exploit if the endpoint is reachable.

Generated by OpenCVE AI on April 17, 2026 at 21:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑issued patch or upgrade PlaciPy to a version that sanitizes query parameters.
  • Implement input validation to ensure query parameters conform to expected data types and values before constructing DynamoDB queries.
  • Use parameterized queries or AWS SDK best practices to build queries securely, avoiding direct string concatenation of user input.

Generated by OpenCVE AI on April 17, 2026 at 21:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Prasklatechnology
Prasklatechnology placipy
CPEs cpe:2.3:a:prasklatechnology:placipy:1.0.0:*:*:*:*:*:*:*
Vendors & Products Prasklatechnology
Prasklatechnology placipy
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 10 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Praskla-technology
Praskla-technology assessment-placipy
Vendors & Products Praskla-technology
Praskla-technology assessment-placipy

Mon, 09 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
Description PlaciPy is a placement management system designed for educational institutions. In version 1.0.0, User-controlled query parameters are passed directly into DynamoDB query/filter construction without validation or sanitization.
Title NoSQL Injection Risk via Unsanitized Query Parameters
Weaknesses CWE-74
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Praskla-technology Assessment-placipy
Prasklatechnology Placipy
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-10T15:58:25.409Z

Reserved: 2026-02-05T19:58:01.643Z

Link: CVE-2026-25814

cve-icon Vulnrichment

Updated: 2026-02-10T15:39:36.525Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T22:16:03.000

Modified: 2026-02-18T20:05:44.870

Link: CVE-2026-25814

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:15:27Z

Weaknesses