CVE-2022-42924: CWE-89: improper neutralization of special elements used in an SQL command (SQL injection) in Forma Forma LMS
Forma LMS on its 3.1.0 version and earlier is vulnerable to a SQL injection vulnerability. The exploitation of this vulnerability could allow an authenticated attacker (with the role of student) to perform a SQL injection on the 'dyn_filter' parameter in the 'appLms/ajax.adm_server.php?r=widget/userselector/getusertabledata' function in order to dump the entire database.
AI Analysis
Technical Summary
CVE-2022-42924 is a high-severity SQL injection vulnerability affecting Forma LMS version 3.1.0 and earlier, specifically confirmed in version 3.0.1. The vulnerability arises from improper neutralization of special elements used in SQL commands (CWE-89) within the 'dyn_filter' parameter of the 'appLms/ajax.adm_server.php?r=widget/userselector/getusertabledata' function. An authenticated attacker with the role of 'student' can exploit this flaw to inject malicious SQL code, enabling them to dump the entire database. This vulnerability does not require user interaction beyond authentication, and the attack vector is network-based with low attack complexity. The CVSS v3.1 score is 7.6, reflecting high impact on confidentiality and availability, with limited integrity impact. The vulnerability allows unauthorized disclosure of sensitive data stored in the LMS database, including potentially user credentials, course content, and other educational records. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk, especially in environments where student accounts are widely accessible. The lack of available patches at the time of reporting further increases exposure risk. The vulnerability was published on October 31, 2022, and has been enriched by CISA and INCIBE, indicating recognition by major cybersecurity authorities.
Potential Impact
For European organizations using Forma LMS, particularly educational institutions and corporate training providers, this vulnerability poses a serious risk to the confidentiality and availability of sensitive educational data. Exploitation could lead to unauthorized access to student records, course materials, and potentially personal identifiable information (PII), which may violate GDPR regulations. The ability to dump the entire database could also facilitate further attacks, such as credential stuffing or phishing campaigns targeting students and staff. Additionally, disruption of LMS services due to availability impact could affect learning continuity and organizational reputation. Given the role-based access requirement (student role), the threat is significant in environments where student accounts are not tightly controlled or monitored. The exposure of sensitive data could lead to regulatory penalties, loss of trust, and operational disruptions within European educational sectors.
Mitigation Recommendations
Organizations should immediately assess their use of Forma LMS versions 3.1.0 and earlier and plan for an upgrade to a patched version once available. In the absence of an official patch, applying web application firewall (WAF) rules to detect and block SQL injection attempts targeting the 'dyn_filter' parameter is recommended. Restricting or monitoring student role permissions to minimize unnecessary access to sensitive functions can reduce exploitation risk. Implementing strict input validation and parameterized queries within custom LMS deployments or extensions can mitigate injection vectors. Regularly auditing LMS logs for unusual query patterns or access attempts can help detect exploitation attempts early. Additionally, enforcing strong authentication and session management controls for student accounts will limit attacker access. Organizations should also prepare incident response plans specific to LMS data breaches and ensure compliance with GDPR notification requirements in case of data exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2022-42924: CWE-89: improper neutralization of special elements used in an SQL command (SQL injection) in Forma Forma LMS
Description
Forma LMS on its 3.1.0 version and earlier is vulnerable to a SQL injection vulnerability. The exploitation of this vulnerability could allow an authenticated attacker (with the role of student) to perform a SQL injection on the 'dyn_filter' parameter in the 'appLms/ajax.adm_server.php?r=widget/userselector/getusertabledata' function in order to dump the entire database.
AI-Powered Analysis
Technical Analysis
CVE-2022-42924 is a high-severity SQL injection vulnerability affecting Forma LMS version 3.1.0 and earlier, specifically confirmed in version 3.0.1. The vulnerability arises from improper neutralization of special elements used in SQL commands (CWE-89) within the 'dyn_filter' parameter of the 'appLms/ajax.adm_server.php?r=widget/userselector/getusertabledata' function. An authenticated attacker with the role of 'student' can exploit this flaw to inject malicious SQL code, enabling them to dump the entire database. This vulnerability does not require user interaction beyond authentication, and the attack vector is network-based with low attack complexity. The CVSS v3.1 score is 7.6, reflecting high impact on confidentiality and availability, with limited integrity impact. The vulnerability allows unauthorized disclosure of sensitive data stored in the LMS database, including potentially user credentials, course content, and other educational records. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk, especially in environments where student accounts are widely accessible. The lack of available patches at the time of reporting further increases exposure risk. The vulnerability was published on October 31, 2022, and has been enriched by CISA and INCIBE, indicating recognition by major cybersecurity authorities.
Potential Impact
For European organizations using Forma LMS, particularly educational institutions and corporate training providers, this vulnerability poses a serious risk to the confidentiality and availability of sensitive educational data. Exploitation could lead to unauthorized access to student records, course materials, and potentially personal identifiable information (PII), which may violate GDPR regulations. The ability to dump the entire database could also facilitate further attacks, such as credential stuffing or phishing campaigns targeting students and staff. Additionally, disruption of LMS services due to availability impact could affect learning continuity and organizational reputation. Given the role-based access requirement (student role), the threat is significant in environments where student accounts are not tightly controlled or monitored. The exposure of sensitive data could lead to regulatory penalties, loss of trust, and operational disruptions within European educational sectors.
Mitigation Recommendations
Organizations should immediately assess their use of Forma LMS versions 3.1.0 and earlier and plan for an upgrade to a patched version once available. In the absence of an official patch, applying web application firewall (WAF) rules to detect and block SQL injection attempts targeting the 'dyn_filter' parameter is recommended. Restricting or monitoring student role permissions to minimize unnecessary access to sensitive functions can reduce exploitation risk. Implementing strict input validation and parameterized queries within custom LMS deployments or extensions can mitigate injection vectors. Regularly auditing LMS logs for unusual query patterns or access attempts can help detect exploitation attempts early. Additionally, enforcing strong authentication and session management controls for student accounts will limit attacker access. Organizations should also prepare incident response plans specific to LMS data breaches and ensure compliance with GDPR notification requirements in case of data exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2022-10-14T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdcaaf
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/5/2025, 10:24:32 PM
Last updated: 8/15/2025, 8:37:12 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.