Impact
A GET request that contains the parameter "seid" can be manipulated to inject arbitrary SQL statements. The vulnerability exists within the function responsible for handling course selections in the CourseSEL application. Attackers can alter the query logic, potentially reading, modifying, or deleting database records, which may compromise confidentiality, integrity, and availability of the educational data stored by the system.
Affected Systems
The flaw affects the CourseSEL product from the halex vendor, specifically versions up to and including 1.1.0. Any deployment of this software that relies on the default HTTP GET parameter handler without protection against injection is susceptible.
Risk and Exploitability
The vulnerability carries a CVSS score of 5.3, indicating moderate severity. Its EPSS score is not available, and it is not listed in the CISA KEV catalog, though the public disclosure confirms that exploitation scripts exist. The attack vector is remote through crafted web requests and does not require local access or elevated privileges, making the threat realistic for any exposed instance of the application.
OpenCVE Enrichment