<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5334 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5334/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 Apr 2026 14:16:37 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5334/feed.xml" rel="self" type="application/rss+xml"/><item><title>SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-04-online-enrollment-sql-injection/</link><pubDate>Thu, 02 Apr 2026 14:16:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-online-enrollment-sql-injection/</guid><description>A SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component at /enrollment/index.php, where manipulating the deptid argument can lead to remote code execution, with public exploits available.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in itsourcecode Online Enrollment System version 1.0. The vulnerability resides within the Parameter Handler component of the application, specifically affecting the <code>/enrollment/index.php</code> endpoint. By manipulating the <code>deptid</code> argument, a remote attacker can inject malicious SQL queries, potentially leading to unauthorized data access, modification, or even remote code execution. This vulnerability is particularly concerning because a public exploit is available, increasing the likelihood of active exploitation. Defenders should prioritize patching or mitigating this vulnerability to prevent potential compromise of their systems. The scope of impact includes any system running the vulnerable version of itsourcecode Online Enrollment System.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of itsourcecode Online Enrollment System 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/enrollment/index.php?view=edit&amp;id=3</code>.</li>
<li>The attacker injects SQL code into the <code>deptid</code> parameter of the HTTP request.</li>
<li>The web server processes the request and passes the tainted <code>deptid</code> parameter to the SQL query.</li>
<li>The injected SQL code is executed against the database, allowing the attacker to bypass authentication or access sensitive data.</li>
<li>The attacker may escalate the attack by attempting to execute arbitrary commands on the server.</li>
<li>Successful exploitation allows the attacker to dump database contents, modify enrollment records, or gain administrative access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could lead to complete compromise of the Online Enrollment System. This includes unauthorized access to sensitive student data, modification of enrollment records, and potentially remote code execution on the server. Given that a public exploit exists, organizations using the vulnerable software are at high risk of experiencing data breaches, financial losses, and reputational damage. The potential victim count depends on the number of installations of the affected Online Enrollment System.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious POST requests to <code>/enrollment/index.php</code> containing potentially malicious SQL syntax within the <code>deptid</code> parameter to identify potential exploitation attempts.</li>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempt via deptid Parameter</code> to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Block requests to <code>/enrollment/index.php?view=edit&amp;id=3</code> containing SQL keywords in the <code>deptid</code> parameter at the WAF or reverse proxy.</li>
<li>Apply input validation and sanitization to the <code>deptid</code> parameter within the application code to prevent SQL injection attacks in the future.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sql-injection</category><category>web-application</category><category>cve-2026-5334</category></item></channel></rss>