Skip to main content

CVE-2022-42924: CWE-89: improper neutralization of special elements used in an SQL command (SQL injection) in Forma Forma LMS

High
VulnerabilityCVE-2022-42924cvecve-2022-42924cwe-89
Published: Mon Oct 31 2022 (10/31/2022, 19:59:33 UTC)
Source: CVE
Vendor/Project: Forma
Product: Forma LMS

Description

Forma LMS on its 3.1.0 version and earlier is vulnerable to a SQL injection vulnerability. The exploitation of this vulnerability could allow an authenticated attacker (with the role of student) to perform a SQL injection on the 'dyn_filter' parameter in the 'appLms/ajax.adm_server.php?r=widget/userselector/getusertabledata' function in order to dump the entire database.

AI-Powered Analysis

AILast updated: 07/05/2025, 22:24:32 UTC

Technical Analysis

CVE-2022-42924 is a high-severity SQL injection vulnerability affecting Forma LMS version 3.1.0 and earlier, specifically confirmed in version 3.0.1. The vulnerability arises from improper neutralization of special elements used in SQL commands (CWE-89) within the 'dyn_filter' parameter of the 'appLms/ajax.adm_server.php?r=widget/userselector/getusertabledata' function. An authenticated attacker with the role of 'student' can exploit this flaw to inject malicious SQL code, enabling them to dump the entire database. This vulnerability does not require user interaction beyond authentication, and the attack vector is network-based with low attack complexity. The CVSS v3.1 score is 7.6, reflecting high impact on confidentiality and availability, with limited integrity impact. The vulnerability allows unauthorized disclosure of sensitive data stored in the LMS database, including potentially user credentials, course content, and other educational records. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk, especially in environments where student accounts are widely accessible. The lack of available patches at the time of reporting further increases exposure risk. The vulnerability was published on October 31, 2022, and has been enriched by CISA and INCIBE, indicating recognition by major cybersecurity authorities.

Potential Impact

For European organizations using Forma LMS, particularly educational institutions and corporate training providers, this vulnerability poses a serious risk to the confidentiality and availability of sensitive educational data. Exploitation could lead to unauthorized access to student records, course materials, and potentially personal identifiable information (PII), which may violate GDPR regulations. The ability to dump the entire database could also facilitate further attacks, such as credential stuffing or phishing campaigns targeting students and staff. Additionally, disruption of LMS services due to availability impact could affect learning continuity and organizational reputation. Given the role-based access requirement (student role), the threat is significant in environments where student accounts are not tightly controlled or monitored. The exposure of sensitive data could lead to regulatory penalties, loss of trust, and operational disruptions within European educational sectors.

Mitigation Recommendations

Organizations should immediately assess their use of Forma LMS versions 3.1.0 and earlier and plan for an upgrade to a patched version once available. In the absence of an official patch, applying web application firewall (WAF) rules to detect and block SQL injection attempts targeting the 'dyn_filter' parameter is recommended. Restricting or monitoring student role permissions to minimize unnecessary access to sensitive functions can reduce exploitation risk. Implementing strict input validation and parameterized queries within custom LMS deployments or extensions can mitigate injection vectors. Regularly auditing LMS logs for unusual query patterns or access attempts can help detect exploitation attempts early. Additionally, enforcing strong authentication and session management controls for student accounts will limit attacker access. Organizations should also prepare incident response plans specific to LMS data breaches and ensure compliance with GDPR notification requirements in case of data exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2022-10-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdcaaf

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/5/2025, 10:24:32 PM

Last updated: 8/15/2025, 8:37:12 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats