Description
A vulnerability was determined in CodeAstro Online Classroom 1.0. Affected is an unknown function of the file /updatedetailsfromstudent.php?eno=146891650. Executing a manipulation of the argument fname can lead to sql injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Published: 2026-04-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection possible via the fname parameter, risking unauthorized data exposure
Action: Patch Immediately
AI Analysis

Impact

The identified weakness allows an attacker to inject arbitrary SQL statements by manipulating the fname argument in the updatedetailsfromstudent.php endpoint. Because the vulnerability exists in a publicly accessible web page, a remote adversary can craft a malicious request without authentication and potentially retrieve sensitive educational data or alter classroom records. The severity score indicates a moderate risk to the integrity and confidentiality of the system’s database.

Affected Systems

This issue affects the CodeAstro Online Classroom application, specifically version 1.0. No other product or vendor versions are listed as impacted.

Risk and Exploitability

A CVSS score of 5.3 indicates moderate severity, and the vulnerability is publicly disclosed with no known EPSS score or KEV listing. The most likely exploitation path involves sending a crafted HTTP GET request to the updatedetailsfromstudent.php page containing a payload in the fname parameter. Without mitigation, unauthorized actors could execute the injection without needing elevated privileges or additional access.

Generated by OpenCVE AI on April 10, 2026 at 09:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an official update to CodeAstro Online Classroom if one is available for the affected version. If no patch exists, manually sanitize or whitelist the fname input on the updatedetailsfromstudent.php page. Disable or restrict remote access to the endpoint if the functionality is not required. Ensure that the web server logs are monitored for suspicious request patterns against the updatedetailsfromstudent.php URL.

Generated by OpenCVE AI on April 10, 2026 at 09:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Codeastro
Codeastro online Classroom
Vendors & Products Codeastro
Codeastro online Classroom

Fri, 10 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 08:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in CodeAstro Online Classroom 1.0. Affected is an unknown function of the file /updatedetailsfromstudent.php?eno=146891650. Executing a manipulation of the argument fname can lead to sql injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.
Title CodeAstro Online Classroom updatedetailsfromstudent.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Codeastro Online Classroom
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T12:59:53.115Z

Reserved: 2026-04-09T16:10:12.853Z

Link: CVE-2026-6033

cve-icon Vulnrichment

Updated: 2026-04-10T12:59:48.878Z

cve-icon NVD

Status : Received

Published: 2026-04-10T08:16:26.690

Modified: 2026-04-10T08:16:26.690

Link: CVE-2026-6033

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T14:40:57Z

Weaknesses