School Management System CMS 1.0 contains an SQL injection vulnerability in the admin login functionality that allows attackers to bypass authentication by injecting SQL code through the username parameter. Attackers can submit malicious payloads using boolean-based blind SQL injection techniques to the processlogin endpoint to authenticate as administrator without valid credentials.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/44727 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/school-management-system-cms-admin-login-sql-injection | Third Party Advisory |
| https://www.wecodex.com/item/view/school-management-system-in-php-and-mysql/5 | Broken Link |
Configurations
History
No history.
Information
Published : 2026-03-26 12:16
Updated : 2026-03-27 20:57
NVD link : CVE-2018-25201
Mitre link : CVE-2018-25201
CVE.ORG link : CVE-2018-25201
JSON object : View
Products Affected
wecodex
- school_management_system_cms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
