Description
A vulnerability was determined in CodeAstro Online Classroom 1.0. This issue affects some unknown processing of the file /OnlineClassroom/updatedetailsfromfaculty.php?myfid=108 of the component Parameter Handler. Executing a manipulation of the argument fname can lead to sql injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Published: 2026-04-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data compromise via SQL injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability exists in CodeAstro Online Classroom 1.0 through the Parameter Handler in the file updatedetailsfromfaculty.php. Input from the argument fname is not properly sanitized, allowing an attacker to inject arbitrary SQL statements. An attacker exploiting this flaw could read, modify, or delete database contents, potentially exposing sensitive user data or disrupting service operation.

Affected Systems

This issue affects CodeAstro’s Online Classroom product, specifically the Parameter Handler component in updatedetailsfromfaculty.php. The reported affected version is 1.0. No additional version details are supplied, so any instance that includes this component may be vulnerable.

Risk and Exploitability

The CVSS base score of 5.3 indicates a moderate severity. EPSS is not available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting no confirmed widespread exploitation. The attack can be carried out remotely by submitting a crafted fname parameter in the request URL. Because the flaw is publicly disclosed, unauthenticated users may be able to exploit it if the file is reachable from the internet.

Generated by OpenCVE AI on April 5, 2026 at 19:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch for CodeAstro Online Classroom if available.
  • If no patch exists, restrict web access to updatedetailsfromfaculty.php to authorized users only.
  • Implement input validation or sanitization for the fname parameter to prevent SQL injection.
  • Monitor database logs for anomalous queries or unauthorized data access attempts.

Generated by OpenCVE AI on April 5, 2026 at 19:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Codeastro
Codeastro online Classroom
Vendors & Products Codeastro
Codeastro online Classroom

Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in CodeAstro Online Classroom 1.0. This issue affects some unknown processing of the file /OnlineClassroom/updatedetailsfromfaculty.php?myfid=108 of the component Parameter Handler. Executing a manipulation of the argument fname can lead to sql injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Title CodeAstro Online Classroom Parameter updatedetailsfromfaculty.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Codeastro Online Classroom
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T16:16:05.979Z

Reserved: 2026-04-04T15:01:54.807Z

Link: CVE-2026-5579

cve-icon Vulnrichment

Updated: 2026-04-06T16:16:00.767Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-05T16:16:20.083

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-5579

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:56:32Z

Weaknesses