CVE-2026-0544

MEDIUM6.9/ 10.0
Share:
Published: January 1, 2026 at 09:15 AM
Modified: January 6, 2026 at 07:25 PM
Source: cna@vuldb.com

Vulnerability Description

A security flaw has been discovered in itsourcecode School Management System 1.0. This affects an unknown part of the file /student/index.php. The manipulation of the argument ID results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.

CVSS Metrics

Base Score
6.9
Severity
MEDIUM
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: cna@vuldb.com
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

School Management System 1.0 is vulnerable to a critical SQL injection flaw, allowing attackers to remotely compromise the system by manipulating the ID parameter in /student/index.php. This vulnerability, with a publicly available exploit, enables unauthorized access to sensitive data and potentially complete system control, posing a significant risk to data confidentiality and integrity.

02 // Vulnerability Mechanism

Step 1: Payload Delivery: The attacker crafts a malicious SQL injection payload designed to be injected into the ID parameter of a GET request.

Step 2: Request Submission: The attacker sends the crafted request to the vulnerable /student/index.php file, targeting the ID parameter.

Step 3: Query Execution: The application receives the request and, without proper sanitization, incorporates the attacker's payload directly into an SQL query.

Step 4: Database Interaction: The database server executes the modified SQL query, which now includes the attacker's malicious code.

Step 5: Data Exfiltration/Manipulation: Based on the injected SQL code, the attacker can then exfiltrate sensitive data (e.g., student records, credentials), modify existing data, or potentially gain administrative access to the database and the underlying system.

03 // Deep Technical Analysis

The vulnerability stems from a lack of proper input validation and sanitization of the ID parameter within the /student/index.php file. Specifically, the application directly incorporates user-supplied input from the ID parameter into an SQL query without any filtering or escaping. This allows an attacker to inject malicious SQL code, altering the intended query logic and enabling unauthorized data retrieval, modification, or even system takeover. The root cause is a failure to implement parameterized queries or use prepared statements, which are crucial for preventing SQL injection attacks. The absence of these security measures allows the attacker to craft a payload that modifies the database query, leading to the execution of arbitrary SQL commands. This is a classic example of a blind SQL injection vulnerability, as the attacker may not see the direct output of the query but can infer information based on the application's behavior.

CVE-2026-0544 - MEDIUM Severity (6.9) | Free CVE Database | 4nuxd