Skip to main content

CVE-2022-42923: CWE-89: improper neutralization of special elements used in an SQL command (SQL injection) in Forma Forma LMS

High
VulnerabilityCVE-2022-42923cvecve-2022-42923cwe-89
Published: Mon Oct 31 2022 (10/31/2022, 19:58:22 UTC)
Source: CVE
Vendor/Project: Forma
Product: Forma LMS

Description

Forma LMS on its 3.1.0 version and earlier is vulnerable to a SQL injection vulnerability. The exploitation of this vulnerability could allow an authenticated attacker (with the role of student) to perform a SQL injection on the 'id' parameter in the 'appCore/index.php?r=adm/mediagallery/delete' function in order to dump the entire database or delete all contents from the 'core_user_file' table.

AI-Powered Analysis

AILast updated: 07/05/2025, 16:42:41 UTC

Technical Analysis

CVE-2022-42923 is a high-severity SQL injection vulnerability affecting Forma LMS version 3.1.0 and earlier, specifically confirmed in version 3.0.1. Forma LMS is an open-source Learning Management System widely used for e-learning and training purposes. The vulnerability arises from improper neutralization of special elements in an SQL command (CWE-89) within the 'appCore/index.php?r=adm/mediagallery/delete' function. An authenticated attacker with the role of 'student' can exploit this flaw by manipulating the 'id' parameter to perform SQL injection attacks. This allows the attacker to execute arbitrary SQL queries on the backend database. Potential malicious actions include dumping the entire database contents, which compromises confidentiality, or deleting all records from the 'core_user_file' table, impacting data integrity and availability. The vulnerability requires low attack complexity (AC:L) and no user interaction (UI:N), but does require the attacker to have authenticated student-level privileges (PR:L). The CVSS v3.1 base score is 8.3, reflecting high impact on confidentiality and integrity, and a low impact on availability. No public exploits are currently known in the wild, but the vulnerability is publicly disclosed and indexed by INCIBE and CISA. There are no official patches linked in the provided data, so remediation may require vendor updates or manual mitigation. The vulnerability affects a critical component of the LMS that handles media gallery deletions, which is likely accessible to authenticated users, increasing the risk of exploitation within organizations using vulnerable versions of Forma LMS.

Potential Impact

For European organizations using Forma LMS, this vulnerability poses significant risks. Educational institutions, corporate training departments, and government agencies relying on Forma LMS for e-learning could face data breaches exposing sensitive user information, including personal data of students and staff. The ability to dump the entire database threatens confidentiality and privacy compliance under GDPR. Deletion of critical data tables could disrupt training operations, causing availability and integrity issues. Since the attacker only needs student-level access, insider threats or compromised student accounts could be leveraged to exploit this vulnerability. This could lead to reputational damage, regulatory penalties, and operational downtime. The impact is particularly severe for organizations with large user bases and sensitive training content. Additionally, the lack of known public exploits suggests that proactive patching and mitigation are essential to prevent future attacks.

Mitigation Recommendations

1. Upgrade Forma LMS to the latest version where this vulnerability is patched. If no official patch is available, contact the vendor for guidance or apply community patches if trustworthy. 2. Implement strict input validation and parameterized queries in the affected 'appCore/index.php?r=adm/mediagallery/delete' function to neutralize SQL injection vectors. 3. Restrict student role permissions to the minimum necessary, especially limiting access to deletion functions or sensitive parameters. 4. Monitor and audit database queries and application logs for unusual or suspicious activity related to the 'id' parameter or media gallery deletions. 5. Employ Web Application Firewalls (WAF) with custom rules to detect and block SQL injection attempts targeting this endpoint. 6. Enforce strong authentication and session management to prevent account compromise of student users. 7. Regularly back up LMS databases and verify backup integrity to enable recovery in case of data deletion attacks. 8. Conduct security awareness training for users to recognize phishing or social engineering attempts that could lead to account compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2022-10-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9f89

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 4:42:41 PM

Last updated: 8/13/2025, 10:14:51 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats