Impact
The vulnerability allows an attacker to inject arbitrary SQL commands into the query executed by /librarysystem/load_student.php. This could enable unauthorized reading of student records, modification of data, or even deletion of the database, thereby compromising the confidentiality, integrity, and availability of the system. The weakness can be identified as an SQL Injection flaw.
Affected Systems
The affected application is Sourcecodester Basic Library System version 1.0, a web-based library management system. The specific file exposed is /librarysystem/load_student.php, which processes user input without proper sanitization. No additional vendor or product information is provided.
Risk and Exploitability
The CVSS score is not supplied, but the nature of SQL injection typically represents a high severity risk. Because the attack vector involves a web form or URL parameter, an external attacker can likely exploit the flaw remotely without needing privileged access. EPSS information is unavailable and the vulnerability is not listed in CISA's KEV catalog, so the likelihood of exploitation is uncertain, yet the potential impact warrants immediate attention.
OpenCVE Enrichment