CVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
CVE-2026-2089 is a medium-severity SQL injection vulnerability in SourceCodester Online Class Record System version 1. 0, specifically in the /admin/subject/controller. php file. The vulnerability allows remote attackers to manipulate the 'ID' parameter without authentication or user interaction, enabling unauthorized access or modification of the backend database. Although no known exploits are currently observed in the wild, the exploit code has been publicly disclosed, increasing the risk of exploitation. This vulnerability can compromise the confidentiality, integrity, and availability of educational data managed by the system. European educational institutions using this software are at risk, especially those with limited security controls. Mitigation requires immediate code review and patching of the vulnerable parameter handling, implementation of prepared statements or parameterized queries, and enhanced input validation. Countries with significant deployment of SourceCodester products or with large educational sectors relying on such systems are most likely affected. Given the medium CVSS score of 6.
AI Analysis
Technical Summary
CVE-2026-2089 identifies a SQL injection vulnerability in the SourceCodester Online Class Record System version 1.0, located in the /admin/subject/controller.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which is directly used in SQL queries. An attacker can remotely exploit this flaw by manipulating the 'ID' argument in HTTP requests to execute arbitrary SQL commands on the backend database. This can lead to unauthorized data disclosure, data modification, or even complete compromise of the database server. The vulnerability requires no authentication or user interaction, making it highly accessible to remote attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no active exploitation has been reported, the public availability of exploit code increases the risk of attacks. The affected product is primarily used in educational environments to manage class records, making sensitive student and academic data vulnerable. The lack of official patches or vendor advisories necessitates immediate action by users to implement mitigations. This vulnerability exemplifies common risks in web applications that fail to properly sanitize user inputs, emphasizing the need for secure coding practices such as using parameterized queries and rigorous input validation.
Potential Impact
For European organizations, particularly educational institutions using the SourceCodester Online Class Record System, this vulnerability poses significant risks. Exploitation can lead to unauthorized access to sensitive student records, grades, and administrative data, potentially violating GDPR and other data protection regulations. Data integrity could be compromised, allowing attackers to alter academic records or disrupt administrative functions. Availability impacts may include denial of service if the database is manipulated or corrupted. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, especially in environments with exposed administrative interfaces. The reputational damage and legal consequences of data breaches in the education sector could be severe. Additionally, attackers could leverage this vulnerability as a foothold for further network intrusion or lateral movement within institutional IT infrastructures. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise without additional factors, but the risk remains substantial given the sensitive nature of the data involved.
Mitigation Recommendations
Organizations should immediately audit their use of the SourceCodester Online Class Record System version 1.0 and restrict access to the /admin/subject/controller.php endpoint to trusted administrators only, ideally via VPN or IP whitelisting. Implement web application firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the 'ID' parameter. Developers should refactor the vulnerable code to use parameterized queries or prepared statements instead of directly embedding user input into SQL commands. Input validation should be enforced to accept only expected data types and formats for the 'ID' parameter. Regularly monitor logs for suspicious activities related to SQL injection attempts. If possible, isolate the database server from direct internet exposure and enforce least privilege principles on database accounts. Since no official patches are currently available, consider migrating to alternative, actively maintained class record systems with better security postures. Finally, conduct security awareness training for administrators to recognize and respond to potential exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
Description
CVE-2026-2089 is a medium-severity SQL injection vulnerability in SourceCodester Online Class Record System version 1. 0, specifically in the /admin/subject/controller. php file. The vulnerability allows remote attackers to manipulate the 'ID' parameter without authentication or user interaction, enabling unauthorized access or modification of the backend database. Although no known exploits are currently observed in the wild, the exploit code has been publicly disclosed, increasing the risk of exploitation. This vulnerability can compromise the confidentiality, integrity, and availability of educational data managed by the system. European educational institutions using this software are at risk, especially those with limited security controls. Mitigation requires immediate code review and patching of the vulnerable parameter handling, implementation of prepared statements or parameterized queries, and enhanced input validation. Countries with significant deployment of SourceCodester products or with large educational sectors relying on such systems are most likely affected. Given the medium CVSS score of 6.
AI-Powered Analysis
Technical Analysis
CVE-2026-2089 identifies a SQL injection vulnerability in the SourceCodester Online Class Record System version 1.0, located in the /admin/subject/controller.php file. The vulnerability arises from improper sanitization or validation of the 'ID' parameter, which is directly used in SQL queries. An attacker can remotely exploit this flaw by manipulating the 'ID' argument in HTTP requests to execute arbitrary SQL commands on the backend database. This can lead to unauthorized data disclosure, data modification, or even complete compromise of the database server. The vulnerability requires no authentication or user interaction, making it highly accessible to remote attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no active exploitation has been reported, the public availability of exploit code increases the risk of attacks. The affected product is primarily used in educational environments to manage class records, making sensitive student and academic data vulnerable. The lack of official patches or vendor advisories necessitates immediate action by users to implement mitigations. This vulnerability exemplifies common risks in web applications that fail to properly sanitize user inputs, emphasizing the need for secure coding practices such as using parameterized queries and rigorous input validation.
Potential Impact
For European organizations, particularly educational institutions using the SourceCodester Online Class Record System, this vulnerability poses significant risks. Exploitation can lead to unauthorized access to sensitive student records, grades, and administrative data, potentially violating GDPR and other data protection regulations. Data integrity could be compromised, allowing attackers to alter academic records or disrupt administrative functions. Availability impacts may include denial of service if the database is manipulated or corrupted. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, especially in environments with exposed administrative interfaces. The reputational damage and legal consequences of data breaches in the education sector could be severe. Additionally, attackers could leverage this vulnerability as a foothold for further network intrusion or lateral movement within institutional IT infrastructures. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise without additional factors, but the risk remains substantial given the sensitive nature of the data involved.
Mitigation Recommendations
Organizations should immediately audit their use of the SourceCodester Online Class Record System version 1.0 and restrict access to the /admin/subject/controller.php endpoint to trusted administrators only, ideally via VPN or IP whitelisting. Implement web application firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the 'ID' parameter. Developers should refactor the vulnerable code to use parameterized queries or prepared statements instead of directly embedding user input into SQL commands. Input validation should be enforced to accept only expected data types and formats for the 'ID' parameter. Regularly monitor logs for suspicious activities related to SQL injection attempts. If possible, isolate the database server from direct internet exposure and enforce least privilege principles on database accounts. Since no official patches are currently available, consider migrating to alternative, actively maintained class record systems with better security postures. Finally, conduct security awareness training for administrators to recognize and respond to potential exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-06T08:25:35.262Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69875704f9fa50a62fe92680
Added to database: 2/7/2026, 3:15:16 PM
Last enriched: 2/7/2026, 3:29:31 PM
Last updated: 2/7/2026, 9:44:45 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2113: Deserialization in yuan1994 tpadmin
MediumCVE-2026-2111: Path Traversal in JeecgBoot
MediumCVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.