Home

Description

A flaw has been found in mathurvishal CloudClassroom-PHP-Project up to 5dadec098bfbbf3300d60c3494db3fb95b66e7be. This impacts an unknown function of the file /postquerypublic.php of the component Post Query Details Page. This manipulation of the argument gnamex causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2026-02-06 | Published 2026-02-06 | Updated 2026-02-23 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
HIGH: 7.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
HIGH: 7.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
7.5AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

SQL Injection

Injection

Product status

5dadec098bfbbf3300d60c3494db3fb95b66e7be
affected

Timeline

2026-02-06:Advisory disclosed
2026-02-06:VulDB entry created
2026-02-18:VulDB entry last update

Credits

bl4dsc4n (VulDB User) reporter

References

vuldb.com/?id.344618 (VDB-344618 | mathurvishal CloudClassroom-PHP-Project Post Query Details postquerypublic.php sql injection) vdb-entry technical-description

vuldb.com/?ctiid.344618 (VDB-344618 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.744236 (Submit #744236 | https://github.com/mathurvishal/CloudClassroom-PHP-Project CloudClassroom PHP Project 1.0 SQL Injection) third-party-advisory

github.com/carlosalbertotuma/CLOUD-CLASSROOMS-php-1.0 related

github.com/carlosalbertotuma/CLOUD-CLASSROOMS-php-1.0 exploit

cve.org (CVE-2026-2058)

nvd.nist.gov (CVE-2026-2058)

Download JSON