Impact
The vulnerability is a classic SQL injection flaw located in an unknown function of the commonController.php file within the checkEmail endpoint of SourceCodester Advanced School Management System 1.0. Attackers can craft input that bypasses intended validation, allowing them to inject arbitrary SQL statements. Successful exploitation could lead to reading sensitive data, modifying database records, or escalating privileges, depending on the database user’s permissions. The issue is classified under CWE-74 and CWE-89, indicating improper handling of untrusted input that results in structural and programmatic manipulation of SQL queries.
Affected Systems
The affected product is SourceCodester Advanced School Management System, version 1.0, distributed by SourceCodester. No additional versions or build identifiers were provided in the CVE entry.
Risk and Exploitability
The CVSS base score is 6.9, reflecting moderate severity. No EPSS data is available, and the vulnerability is not listed in CISA's KEV catalog. Remote exploitation is possible, and public exploit code has already been released on repositories, indicating that attackers could readily target any unpatched installation. Organizers should consider the risk of data exposure and potential disruption when evaluating this flaw. Awaiting vendor remediation, the system remains vulnerable to exploitation.
OpenCVE Enrichment