Impact
A flaw in QueryMine:sms allows an attacker to manipulate the ID argument of admin/editcourse.php and inject arbitrary SQL. The vulnerability is triggered by a GET request and can be exploited remotely, giving the attacker unauthenticated access to the database. The injection could lead to data exfiltration, unauthorized modification of records, or database compromise, representing a significant risk to confidentiality and integrity.
Affected Systems
The affected component is QueryMine:sms, specifically the admin/editcourse.php file. The vulnerability is present in versions up to commit 7ab5a9ea196209611134525ffc18de25c57d9593; the vendor has not published a fix and no newer releases are available at present.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and the EPSS score is not available, but the issue is publicly documented and can be exploited without authentication. The vulnerability is not listed in CISA KEV, yet its remote nature and SQL injection vector make it a noteworthy risk that could be leveraged by threat actors to compromise the database.
OpenCVE Enrichment