Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2058: SQL Injection in mathurvishal CloudClassroom-PHP-Project

0
Medium
VulnerabilityCVE-2026-2058cvecve-2026-2058
Published: Fri Feb 06 2026 (02/06/2026, 16:32:08 UTC)
Source: CVE Database V5
Vendor/Project: mathurvishal
Product: CloudClassroom-PHP-Project

Description

A flaw has been found in mathurvishal CloudClassroom-PHP-Project up to 5dadec098bfbbf3300d60c3494db3fb95b66e7be. This impacts an unknown function of the file /postquerypublic.php of the component Post Query Details Page. This manipulation of the argument gnamex causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:08:19 UTC

Technical Analysis

CVE-2026-2058 identifies a SQL injection vulnerability in the CloudClassroom-PHP-Project developed by mathurvishal. The vulnerability resides in the /postquerypublic.php file, specifically in the handling of the gnamex parameter within the Post Query Details Page component. An attacker can remotely inject malicious SQL code through this parameter, manipulating backend database queries without requiring authentication or user interaction. This can lead to unauthorized data access, modification, or deletion, compromising the confidentiality, integrity, and availability of the affected system's data. The project uses a rolling release strategy, making it difficult to pinpoint exact affected versions beyond the given commit hash. The vendor has not responded to disclosure attempts, and no official patches are available. Although no widespread exploitation has been reported, published exploits increase the risk of attacks. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability at a low level. This vulnerability highlights the importance of secure input validation and parameterized queries in PHP web applications.

Potential Impact

The SQL injection vulnerability allows remote attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data manipulation, or deletion. This can compromise sensitive educational data, user credentials, or administrative information stored in the CloudClassroom system. The integrity of the application and its data can be undermined, affecting trust and operational continuity. Availability may also be impacted if attackers execute destructive queries or cause database errors. Organizations relying on this software for educational or training purposes may face data breaches, regulatory penalties, and reputational damage. The lack of vendor response and patches increases the window of exposure, making timely mitigation critical. Since the exploit is publicly available, the likelihood of attacks increases, especially against unpatched or poorly secured deployments.

Mitigation Recommendations

Organizations should immediately audit their CloudClassroom-PHP-Project deployments for the presence of the vulnerable /postquerypublic.php file and the gnamex parameter. Until an official patch is released, implement the following mitigations: 1) Apply strict input validation and sanitization on all user-supplied parameters, especially gnamex, to reject or escape SQL meta-characters. 2) Refactor database queries to use prepared statements with parameterized queries to eliminate direct concatenation of user input. 3) Employ web application firewalls (WAFs) with SQL injection detection rules to block malicious payloads targeting this vulnerability. 4) Monitor logs for suspicious query patterns or repeated access to /postquerypublic.php with unusual parameter values. 5) Restrict database user privileges to the minimum necessary to limit the impact of potential exploitation. 6) Consider isolating the application environment and enforcing network segmentation to reduce exposure. 7) Stay alert for vendor updates or community patches and apply them promptly once available. 8) Educate developers on secure coding practices to prevent similar vulnerabilities in future releases.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T06:30:57.424Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69861a9bf9fa50a62f1c9098

Added to database: 2/6/2026, 4:45:15 PM

Last enriched: 2/23/2026, 10:08:19 PM

Last updated: 3/24/2026, 12:34:04 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses