Description
A security vulnerability has been detected in CodeAstro Online Classroom 1.0. Affected is an unknown function of the file /guestdetails. Such manipulation of the argument deleteid leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
Published: 2026-04-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the deleteid parameter of the /guestdetails endpoint in CodeAstro Online Classroom 1.0. By manipulating this parameter, an attacker can inject arbitrary SQL statements. This allows unauthorized modification, exfiltration, or destruction of data stored in the application database. The flaw is a classic input validation weakness (CWE‑74) that can lead to a full SQL injection (CWE‑89). The potential consequences include loss of data integrity, confidentiality breaches, and possible escalation to a database compromise, depending on the privileges granted to the affected user.

Affected Systems

CodeAstro Online Classroom, version 1.0, includes a guestdetails page that processes a deleteid query parameter without proper sanitization. No other versions or configurations are specifically listed.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. The description states the attack can be performed from remote, suggesting that any outsider with network access to the application can trigger the exploit. Publicly disclosed exploits exist, and no authentication requirement is mentioned, so the risk is amplified for publicly accessible deployments.

Generated by OpenCVE AI on April 28, 2026 at 12:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch or upgrade to a version that fixes the SQL injection flaw
  • Use parameterized queries or stored procedures when accessing the guestdetails delete operation to eliminate injection vectors
  • Implement strict input validation and output encoding for the deleteid parameter to guard against malformed input
  • Restrict access to the deletion functionality so that only authorized users can trigger deleteid changes

Generated by OpenCVE AI on April 28, 2026 at 12:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
First Time appeared Codeastro
Codeastro online Classroom
Vendors & Products Codeastro
Codeastro online Classroom

Mon, 27 Apr 2026 23:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in CodeAstro Online Classroom 1.0. Affected is an unknown function of the file /guestdetails. Such manipulation of the argument deleteid leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
Title CodeAstro Online Classroom guestdetails sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Codeastro Online Classroom
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-28T14:35:24.217Z

Reserved: 2026-04-27T13:50:12.560Z

Link: CVE-2026-7196

cve-icon Vulnrichment

Updated: 2026-04-28T13:41:27.637Z

cve-icon NVD

Status : Deferred

Published: 2026-04-28T00:16:26.810

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-7196

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T13:00:15Z

Weaknesses