Description
A security flaw has been discovered in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The impacted element is an unknown function of the file /Profilers/SProfile/reg.php. Performing manipulation of the argument USN results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited.
Problem types
Product status
Timeline
| 2025-12-12: | Advisory disclosed |
| 2025-12-12: | VulDB entry created |
| 2025-12-12: | VulDB entry last update |
Credits
AntiZ (VulDB User)
References
vuldb.com/?id.336190 (VDB-336190 | kidaze CourseSelectionSystem reg.php sql injection)
vuldb.com/?ctiid.336190 (VDB-336190 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.703876 (Submit #703876 | github.com Course Selection System v1.0 SQL injection)
vuldb.com/?submit.704951 (Submit #704951 | github.com Course Selection System Project V1.0 SQL Injection (Duplicate))
github.com/Anti1i/cve/issues/2
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.