Description
A vulnerability was identified in ProjectsAndPrograms School Management System up to 6b6fae5426044f89c08d0dd101c7fa71f9042a59. This vulnerability affects unknown code of the file buslocation.php of the component HTTP GET Parameter Handler. The manipulation of the argument bus_id leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
Timeline
| 2026-04-19: | Advisory disclosed |
| 2026-04-19: | VulDB entry created |
| 2026-04-19: | VulDB entry last update |
Credits
EthX0_ (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/358230 (VDB-358230 | ProjectsAndPrograms School Management System HTTP GET Parameter buslocation.php sql injection)
vuldb.com/vuln/358230/cti (VDB-358230 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/791820 (Submit #791820 | ProjectsAndPrograms school-management-system commit 6b6fae5 SQL Injection)
tcn60zf28jhk.feishu.cn/...bske8Ozc6XTjnIh?from=from_copylink