CVE-2023-6618: CWE-73 File Inclusion in SourceCodester Simple Student Attendance System
A vulnerability was found in SourceCodester Simple Student Attendance System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument page leads to file inclusion. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247255.
AI Analysis
Technical Summary
CVE-2023-6618 is a medium severity vulnerability identified in SourceCodester Simple Student Attendance System version 1.0. The vulnerability is classified under CWE-73, which corresponds to improper file inclusion. Specifically, the issue arises from the manipulation of the 'page' parameter in the index.php file, which allows an attacker to include arbitrary files. This can lead to unauthorized disclosure of sensitive information, modification of data, or disruption of service depending on the files included and the server configuration. The vulnerability requires low privileges (PR:L) and no user interaction (UI:N), but the attacker must have access to the network (AV:A), meaning exploitation is possible remotely but typically within the same network or VPN. The CVSS v3.1 base score is 5.5, reflecting a medium severity level with impacts on confidentiality, integrity, and availability, albeit limited in scope and requiring some privileges. No public exploits are currently known in the wild, and no patches have been linked yet. The vulnerability could be exploited to read sensitive files or execute arbitrary code if combined with other vulnerabilities or misconfigurations, making it a notable risk for organizations using this software.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the deployment of the affected Simple Student Attendance System 1.0. Educational institutions or organizations using this system to track attendance could face unauthorized access to student data, including personally identifiable information (PII), which is subject to strict GDPR regulations. The file inclusion flaw could allow attackers to access configuration files, credentials, or other sensitive data, potentially leading to data breaches and compliance violations. Additionally, if exploited to alter attendance records or disrupt system availability, it could undermine operational integrity and trust. The medium severity score suggests moderate risk, but the potential for cascading effects, such as lateral movement within a network or privilege escalation, could increase the impact. European organizations must consider the reputational damage and legal consequences of data exposure, especially in sectors like education where data protection is critical.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if they are running SourceCodester Simple Student Attendance System version 1.0 and assess exposure to the vulnerable index.php 'page' parameter. Since no official patch is currently available, immediate mitigation includes implementing strict input validation and sanitization on the 'page' parameter to prevent arbitrary file inclusion. Employing web application firewalls (WAFs) with rules to detect and block file inclusion attempts can provide an additional layer of defense. Restricting network access to the application to trusted users and networks reduces the attack surface, given the attack vector requires network access. Monitoring logs for suspicious requests targeting the 'page' parameter is also recommended. Long-term, organizations should plan to upgrade to a patched version once available or consider alternative attendance systems with better security track records. Conducting regular security assessments and penetration tests focusing on file inclusion and input validation vulnerabilities will help identify and remediate similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2023-6618: CWE-73 File Inclusion in SourceCodester Simple Student Attendance System
Description
A vulnerability was found in SourceCodester Simple Student Attendance System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument page leads to file inclusion. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247255.
AI-Powered Analysis
Technical Analysis
CVE-2023-6618 is a medium severity vulnerability identified in SourceCodester Simple Student Attendance System version 1.0. The vulnerability is classified under CWE-73, which corresponds to improper file inclusion. Specifically, the issue arises from the manipulation of the 'page' parameter in the index.php file, which allows an attacker to include arbitrary files. This can lead to unauthorized disclosure of sensitive information, modification of data, or disruption of service depending on the files included and the server configuration. The vulnerability requires low privileges (PR:L) and no user interaction (UI:N), but the attacker must have access to the network (AV:A), meaning exploitation is possible remotely but typically within the same network or VPN. The CVSS v3.1 base score is 5.5, reflecting a medium severity level with impacts on confidentiality, integrity, and availability, albeit limited in scope and requiring some privileges. No public exploits are currently known in the wild, and no patches have been linked yet. The vulnerability could be exploited to read sensitive files or execute arbitrary code if combined with other vulnerabilities or misconfigurations, making it a notable risk for organizations using this software.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the deployment of the affected Simple Student Attendance System 1.0. Educational institutions or organizations using this system to track attendance could face unauthorized access to student data, including personally identifiable information (PII), which is subject to strict GDPR regulations. The file inclusion flaw could allow attackers to access configuration files, credentials, or other sensitive data, potentially leading to data breaches and compliance violations. Additionally, if exploited to alter attendance records or disrupt system availability, it could undermine operational integrity and trust. The medium severity score suggests moderate risk, but the potential for cascading effects, such as lateral movement within a network or privilege escalation, could increase the impact. European organizations must consider the reputational damage and legal consequences of data exposure, especially in sectors like education where data protection is critical.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if they are running SourceCodester Simple Student Attendance System version 1.0 and assess exposure to the vulnerable index.php 'page' parameter. Since no official patch is currently available, immediate mitigation includes implementing strict input validation and sanitization on the 'page' parameter to prevent arbitrary file inclusion. Employing web application firewalls (WAFs) with rules to detect and block file inclusion attempts can provide an additional layer of defense. Restricting network access to the application to trusted users and networks reduces the attack surface, given the attack vector requires network access. Monitoring logs for suspicious requests targeting the 'page' parameter is also recommended. Long-term, organizations should plan to upgrade to a patched version once available or consider alternative attendance systems with better security track records. Conducting regular security assessments and penetration tests focusing on file inclusion and input validation vulnerabilities will help identify and remediate similar issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2023-12-08T09:54:32.552Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6835d30c182aa0cae216c46a
Added to database: 5/27/2025, 2:58:20 PM
Last enriched: 7/6/2025, 2:57:02 AM
Last updated: 7/29/2025, 4:53:01 AM
Views: 8
Related Threats
CVE-2025-8960: SQL Injection in Campcodes Online Flight Booking Management System
MediumCVE-2025-8958: Stack-based Buffer Overflow in Tenda TX3
HighCVE-2025-8957: SQL Injection in Campcodes Online Flight Booking Management System
MediumCVE-2025-54707: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in RealMag777 MDTF
CriticalCVE-2025-54706: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Noor Alam Magical Posts Display
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.