Description
A security flaw has been discovered in CodeAstro Online Classroom 1.0/2.php. Affected by this vulnerability is an unknown functionality of the file /OnlineClassroom/takeassessment2.php?exid=14. Performing a manipulation of the argument Q1 results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks.
Published: 2026-04-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Patch
AI Analysis

Impact

A flaw exists in the CodeAstro Online Classroom application, specifically within the takeassessment2.php script. By manipulating the Q1 parameter in the request, an attacker can inject arbitrary SQL commands. This injection allows the modification or retrieval of data stored in the system’s database, potentially exposing sensitive information and allowing further exploitation. The vulnerability is actionable from a remote web interface, meaning an attacker does not need local access.

Affected Systems

The affected product is CodeAstro Online Classroom, identified by the CNA as CodeAstro:Online Classroom. The vulnerability is present in the 1.0/2.php release and is triggered when accessing /OnlineClassroom/takeassessment2.php with a valid exid value such as 14. No other specific product versions are listed as affected in the available data.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity risk. EPSS data is not available, and the flaw is not recorded in the CISA KEV catalog. An attacker can reach the vulnerable endpoint remotely over HTTP or HTTPS, and publicly available exploit code confirms that exploitation is straightforward. Consequently, organizations running this version should consider the risk moderate to high, especially if sensitive student or academic data is stored in the database.

Generated by OpenCVE AI on April 10, 2026 at 04:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor-published patch or upgrade to the latest version of CodeAstro Online Classroom that resolves the SQL injection in takeassessment2.php.
  • If a patch is not yet available, block external access to the /takeassessment2.php endpoint or remove the feature from the deployment.
  • Audit the application code to ensure that all user inputs are sanitized and that prepared statements are used for database interactions.
  • Enable monitoring of database logs for unusual query patterns that could indicate an ongoing injection attempt.

Generated by OpenCVE AI on April 10, 2026 at 04:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Codeastro
Codeastro online Classroom
Vendors & Products Codeastro
Codeastro online Classroom

Fri, 10 Apr 2026 03:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in CodeAstro Online Classroom 1.0/2.php. Affected by this vulnerability is an unknown functionality of the file /OnlineClassroom/takeassessment2.php?exid=14. Performing a manipulation of the argument Q1 results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks.
Title CodeAstro Online Classroom takeassessment2.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Codeastro Online Classroom
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-14T03:18:56.594Z

Reserved: 2026-04-09T14:21:42.076Z

Link: CVE-2026-6010

cve-icon Vulnrichment

Updated: 2026-04-14T03:18:50.618Z

cve-icon NVD

Status : Deferred

Published: 2026-04-10T04:17:25.640

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6010

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:52Z

Weaknesses