Impact
The vulnerability lies in the delete_post.php handler of SourceCodester Simple E-learning System, where an attacker can supply a crafted post_id via the HTTP GET parameter. This manipulation allows arbitrary SQL statements to be executed against the database, potentially exposing, modifying, or deleting sensitive course and user data. The flaw stems from insufficient input validation and direct inclusion of the parameter in SQL queries (CWE-89).
Affected Systems
The flaw exists in SourceCodester Simple E-learning System version 1.0, specifically within the file /includes/form_handlers/delete_post.php. No other variants or versions were identified in the CVE data.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate risk, and while no EPSS value is available, the vulnerability was publicly disclosed and can be exploited remotely by sending a crafted URL with a malicious post_id. Since it does not appear in the CISA KEV catalog, the current threat level is moderate but non-negligible. Exploitation requires only network access to the application and does not necessitate authentication.
OpenCVE Enrichment