SourceCodester Advanced School Management System SQL Injection Vulnerability
A SQL injection vulnerability (CVE-2026-7545) exists in SourceCodester Advanced School Management System 1.0 within the checkEmail endpoint of commonController.php, allowing remote attackers to potentially execute arbitrary SQL commands.
SourceCodester Advanced School Management System version 1.0 is vulnerable to SQL injection in the checkEmail endpoint within the commonController.php file. This vulnerability, identified as CVE-2026-7545, allows a remote attacker to inject arbitrary SQL commands. Publicly available exploits targeting this vulnerability increase the risk of exploitation. Successful exploitation could lead to unauthorized data access, modification, or deletion within the application’s database. Given the availability of public exploits, organizations using this software are at an elevated risk.
Attack Chain
- The attacker identifies the
checkEmailendpoint incommonController.php. - The attacker crafts a malicious HTTP request to the
checkEmailendpoint, injecting SQL code into the email parameter. - The vulnerable application fails to properly sanitize the email input.
- The injected SQL code is passed directly to the database query.
- The database executes the malicious SQL code.
- The attacker gains unauthorized access to the database.
- The attacker may then read sensitive data, modify existing data, or insert new malicious data.
- The attacker might also use this to escalate privileges within the application.
Impact
Successful exploitation of this SQL injection vulnerability (CVE-2026-7545) could allow an attacker to read, modify, or delete sensitive data stored in the Advanced School Management System database. This could include student records, financial information, or administrative credentials. The availability of public exploits increases the likelihood of attacks targeting this vulnerability, potentially impacting any organization using the affected software.
Recommendation
- Apply input validation and sanitization to the
checkEmailendpoint incommonController.phpto prevent SQL injection attacks. - Deploy the Sigma rule
Detect ASMS CheckEmail SQL Injection Attemptto identify exploitation attempts in web server logs. - Monitor web server logs for suspicious activity related to the
checkEmailendpoint.
Detection coverage 2
Detect ASMS CheckEmail SQL Injection Attempt
highDetects potential SQL injection attempts targeting the checkEmail endpoint in SourceCodester Advanced School Management System.
Detect ASMS CommonController Access
lowDetects access to the commonController.php file, which is associated with a SQL injection vulnerability in SourceCodester Advanced School Management System.
Detection queries are kept inside the platform. Get full rules →