Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-41252: n/a

0
Medium
VulnerabilityCVE-2024-41252cvecve-2024-41252
Published: Wed Aug 07 2024 (08/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An Incorrect Access Control vulnerability was found in /smsa/admin_student_register_approval.php and /smsa/admin_student_register_approval_submit.php in Kashipara Responsive School Management System v3.2.0, which allows remote unauthenticated attackers to view and approve student registration.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:34:40 UTC

Technical Analysis

CVE-2024-41252 identifies an Incorrect Access Control vulnerability in Kashipara Responsive School Management System version 3.2.0. The affected components are two PHP scripts: admin_student_register_approval.php and admin_student_register_approval_submit.php. These scripts handle the approval process for student registrations within the system. Due to improper access control, remote attackers can access these endpoints without authentication, enabling them to view pending student registrations and approve them arbitrarily. This bypasses intended administrative controls, potentially allowing unauthorized users to manipulate student enrollment data. The vulnerability is classified under CWE-284 (Improper Access Control), indicating a failure to restrict access to privileged functions. The CVSS v3.1 base score is 5.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning the attack is network-based, requires no privileges or user interaction, affects confidentiality slightly, but does not impact integrity or availability. No patches or exploits are currently documented, but the risk remains due to the ease of exploitation and the sensitive nature of school management data.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of student registration information and unauthorized approval of student registrations. This can lead to enrollment of unverified or malicious users into the school system, potentially compromising the integrity of student records and administrative processes. While the vulnerability does not directly affect system availability or data integrity, unauthorized approvals could disrupt school operations and trust in the system. Educational institutions relying on this software may face compliance and privacy issues, especially under regulations protecting student data. The ease of exploitation without authentication increases the risk of automated or mass exploitation attempts. Although no known exploits exist yet, the vulnerability could be leveraged by attackers to gain footholds in school networks or to conduct social engineering attacks using falsified student identities.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit and enforce strict access control mechanisms on the affected PHP scripts. This includes implementing robust authentication and authorization checks to ensure only legitimate administrators can view and approve student registrations. Input validation and session management should be reviewed to prevent unauthorized access. If possible, restrict access to these endpoints by IP whitelisting or VPN access to trusted networks. Monitoring and logging of all approval actions should be enhanced to detect suspicious activities. Since no official patch is currently available, consider temporarily disabling the affected approval functions or placing them behind additional authentication layers. Engage with the software vendor or community to obtain or develop patches. Regularly update the system and apply security best practices for web applications to reduce the attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cb3b7ef31ef0b5682e2

Added to database: 2/25/2026, 9:42:11 PM

Last enriched: 2/28/2026, 5:34:40 AM

Last updated: 4/12/2026, 2:37:02 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses