CVE-2022-42923: CWE-89: improper neutralization of special elements used in an SQL command (SQL injection) in Forma Forma LMS
Forma LMS on its 3.1.0 version and earlier is vulnerable to a SQL injection vulnerability. The exploitation of this vulnerability could allow an authenticated attacker (with the role of student) to perform a SQL injection on the 'id' parameter in the 'appCore/index.php?r=adm/mediagallery/delete' function in order to dump the entire database or delete all contents from the 'core_user_file' table.
AI Analysis
Technical Summary
CVE-2022-42923 is a high-severity SQL injection vulnerability affecting Forma LMS version 3.1.0 and earlier, specifically confirmed in version 3.0.1. Forma LMS is an open-source Learning Management System widely used for e-learning and training purposes. The vulnerability arises from improper neutralization of special elements in an SQL command (CWE-89) within the 'appCore/index.php?r=adm/mediagallery/delete' function. An authenticated attacker with the role of 'student' can exploit this flaw by manipulating the 'id' parameter to perform SQL injection attacks. This allows the attacker to execute arbitrary SQL queries on the backend database. Potential malicious actions include dumping the entire database contents, which compromises confidentiality, or deleting all records from the 'core_user_file' table, impacting data integrity and availability. The vulnerability requires low attack complexity (AC:L) and no user interaction (UI:N), but does require the attacker to have authenticated student-level privileges (PR:L). The CVSS v3.1 base score is 8.3, reflecting high impact on confidentiality and integrity, and a low impact on availability. No public exploits are currently known in the wild, but the vulnerability is publicly disclosed and indexed by INCIBE and CISA. There are no official patches linked in the provided data, so remediation may require vendor updates or manual mitigation. The vulnerability affects a critical component of the LMS that handles media gallery deletions, which is likely accessible to authenticated users, increasing the risk of exploitation within organizations using vulnerable versions of Forma LMS.
Potential Impact
For European organizations using Forma LMS, this vulnerability poses significant risks. Educational institutions, corporate training departments, and government agencies relying on Forma LMS for e-learning could face data breaches exposing sensitive user information, including personal data of students and staff. The ability to dump the entire database threatens confidentiality and privacy compliance under GDPR. Deletion of critical data tables could disrupt training operations, causing availability and integrity issues. Since the attacker only needs student-level access, insider threats or compromised student accounts could be leveraged to exploit this vulnerability. This could lead to reputational damage, regulatory penalties, and operational downtime. The impact is particularly severe for organizations with large user bases and sensitive training content. Additionally, the lack of known public exploits suggests that proactive patching and mitigation are essential to prevent future attacks.
Mitigation Recommendations
1. Upgrade Forma LMS to the latest version where this vulnerability is patched. If no official patch is available, contact the vendor for guidance or apply community patches if trustworthy. 2. Implement strict input validation and parameterized queries in the affected 'appCore/index.php?r=adm/mediagallery/delete' function to neutralize SQL injection vectors. 3. Restrict student role permissions to the minimum necessary, especially limiting access to deletion functions or sensitive parameters. 4. Monitor and audit database queries and application logs for unusual or suspicious activity related to the 'id' parameter or media gallery deletions. 5. Employ Web Application Firewalls (WAF) with custom rules to detect and block SQL injection attempts targeting this endpoint. 6. Enforce strong authentication and session management to prevent account compromise of student users. 7. Regularly back up LMS databases and verify backup integrity to enable recovery in case of data deletion attacks. 8. Conduct security awareness training for users to recognize phishing or social engineering attempts that could lead to account compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2022-42923: CWE-89: improper neutralization of special elements used in an SQL command (SQL injection) in Forma Forma LMS
Description
Forma LMS on its 3.1.0 version and earlier is vulnerable to a SQL injection vulnerability. The exploitation of this vulnerability could allow an authenticated attacker (with the role of student) to perform a SQL injection on the 'id' parameter in the 'appCore/index.php?r=adm/mediagallery/delete' function in order to dump the entire database or delete all contents from the 'core_user_file' table.
AI-Powered Analysis
Technical Analysis
CVE-2022-42923 is a high-severity SQL injection vulnerability affecting Forma LMS version 3.1.0 and earlier, specifically confirmed in version 3.0.1. Forma LMS is an open-source Learning Management System widely used for e-learning and training purposes. The vulnerability arises from improper neutralization of special elements in an SQL command (CWE-89) within the 'appCore/index.php?r=adm/mediagallery/delete' function. An authenticated attacker with the role of 'student' can exploit this flaw by manipulating the 'id' parameter to perform SQL injection attacks. This allows the attacker to execute arbitrary SQL queries on the backend database. Potential malicious actions include dumping the entire database contents, which compromises confidentiality, or deleting all records from the 'core_user_file' table, impacting data integrity and availability. The vulnerability requires low attack complexity (AC:L) and no user interaction (UI:N), but does require the attacker to have authenticated student-level privileges (PR:L). The CVSS v3.1 base score is 8.3, reflecting high impact on confidentiality and integrity, and a low impact on availability. No public exploits are currently known in the wild, but the vulnerability is publicly disclosed and indexed by INCIBE and CISA. There are no official patches linked in the provided data, so remediation may require vendor updates or manual mitigation. The vulnerability affects a critical component of the LMS that handles media gallery deletions, which is likely accessible to authenticated users, increasing the risk of exploitation within organizations using vulnerable versions of Forma LMS.
Potential Impact
For European organizations using Forma LMS, this vulnerability poses significant risks. Educational institutions, corporate training departments, and government agencies relying on Forma LMS for e-learning could face data breaches exposing sensitive user information, including personal data of students and staff. The ability to dump the entire database threatens confidentiality and privacy compliance under GDPR. Deletion of critical data tables could disrupt training operations, causing availability and integrity issues. Since the attacker only needs student-level access, insider threats or compromised student accounts could be leveraged to exploit this vulnerability. This could lead to reputational damage, regulatory penalties, and operational downtime. The impact is particularly severe for organizations with large user bases and sensitive training content. Additionally, the lack of known public exploits suggests that proactive patching and mitigation are essential to prevent future attacks.
Mitigation Recommendations
1. Upgrade Forma LMS to the latest version where this vulnerability is patched. If no official patch is available, contact the vendor for guidance or apply community patches if trustworthy. 2. Implement strict input validation and parameterized queries in the affected 'appCore/index.php?r=adm/mediagallery/delete' function to neutralize SQL injection vectors. 3. Restrict student role permissions to the minimum necessary, especially limiting access to deletion functions or sensitive parameters. 4. Monitor and audit database queries and application logs for unusual or suspicious activity related to the 'id' parameter or media gallery deletions. 5. Employ Web Application Firewalls (WAF) with custom rules to detect and block SQL injection attempts targeting this endpoint. 6. Enforce strong authentication and session management to prevent account compromise of student users. 7. Regularly back up LMS databases and verify backup integrity to enable recovery in case of data deletion attacks. 8. Conduct security awareness training for users to recognize phishing or social engineering attempts that could lead to account compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2022-10-14T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd9f89
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 7/5/2025, 4:42:41 PM
Last updated: 8/13/2025, 10:14:51 PM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.